KnowBe4
Source: KnowBe4 |

Training is crucial, but feeling safe enough to speak up is critical for cyber resilience

Instead of coming down hard on employees who mess up, managers should frame these incidents as valuable insights about attack sophistication rather than user failure

Cybersecurity training is vital, but it’s not enough on its own if your workplace culture discourages people from speaking up. Good corporate security awareness includes empowering employees to think critically, voice concerns and admit mistakes, without fear of reprisal. The secret is something all parents who’ve gotten their children to…

KnowBe4
Source: KnowBe4 |

Cluttered desktops: The ‘I might need this someday’ mindset is creating a cybersecurity nightmare

Unlike physical clutter, digital hoarding creates an invisible risk – people may not even know what data they’re storing or where

Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, SVP of Content Strategy and CISO Advisor at KnowBe4 Africa (http://www.KnowBe4.com/). Like a garage slowly filling with forgotten boxes, our digital workspaces are becoming repositories of unmanaged data. We…

KnowBe4
Source: KnowBe4 |

Beware the Bring Your Own Device (BYOD) blind spot: Personal devices are a complicated weak link

Some useful technical controls include employees having strong passwords, multifactor authentication (MFA), encryption, endpoint security and patching

Up to 84% of organisations globally practise bring your own device (BYOD) in some form, but only half of them officially allow it, according to a recent report (https://apo-opa.co/498rnlG). While the convenience and cost saving of employees’ using their own personal devices for work is undeniable, there are many security…

KnowBe4
Source: KnowBe4 |

The rise of the “shadow employee”: When ex-employees still have access

According to a recent study, 89% of former employees keep valid logins, while 45% retain access to confidential data after departure

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply overlooked during offboarding. Months later, the ex-employee…

KnowBe4
Source: KnowBe4 |

Digital gossip: When WhatsApp groups become serious cyber-risk zones

Official communications ending up on personal devices and informal platforms is a problem very clearly not exclusive to the corporate sector

Despite their popularity among employees, informal messaging platforms pose significant risks to organisations’ cybersecurity. The 2025 KnowBe4 (www.KnowBe4.com) Africa Annual Cybersecurity survey (https://apo-opa.co/47oRLHi) found that 93% of African respondents use WhatsApp for work communications, surpassing email and Microsoft Teams. What can organisations do to protect themselves from data leakage and…

KnowBe4
  • Multimedia content

  • Images (1)
    • Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa
  • All (1)
Source: KnowBe4 |

New KnowBe4 Report Finds Key African Industries May Be Dangerously Overestimating Cyber Defences

The KnowBe4 Africa Human Risk Management Report 2025 highlights worrying mismatch between perception and reality in cybersecurity

KnowBe4 (www.KnowBe4.com), the world-renowned cybersecurity platform that comprehensively addresses human risk management, today released its new report “Africa Human Risk Management Report 2025”. The report reveals a mismatch between employer perceptions and employee experience of organisational cybersecurity in key African industries – with potentially costly consequences. The report (https://apo-opa.co/45TKgqm) captures insights…

KnowBe4
Source: KnowBe4 |

From London to Lagos: Why retailers everywhere must prepare for the next wave of cyberattacks

Recent cyberattacks on major UK retailers like Marks & Spencer and the Co-op aren’t just headline-grabbing stories, they provide a cautionary tale of the evolving threat landscape facing modern retail globally; For African retailers accelerating digital transformation, these incidents serve as a crucial case study in what can go wrong when uptime – not just data – is under attack

In April, two of Britain’s biggest retailers got hit by a massive cyberattack by the notorious Scattered Spider group, leading to substantial financial losses, operational disruptions and compromised customer data (http://apo-opa.co/40O1faD). M&S suffered losses of £300 million (http://apo-opa.co/40O1gLJ) (roughly R7.3 billion) due to the attack, with supply chains affected for…

KnowBe4
Source: KnowBe4 |

Business-critical mails in spam folders: Why real emails look fake now

Even the best-written email may never reach its recipient if your authentication protocols aren’t properly configured

In the fight against phishing, forward-thinking organisations are winning. But there’s a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged, ignored, or buried in spam folders. And in today’s AI-fuelled cyber landscape, that reaction…

KnowBe4
Source: KnowBe4 |

Perilous prompts: How generative Artificial Intelligence (AI) is leaking companies' secrets

Seemingly benign details can be stitched into detailed profiles by cybercriminals or data brokers – fuelling targeted phishing, identity theft, and sophisticated social engineering

Beneath the surface of GenAI’s outputs lies a massive, mostly unregulated engine powered by data – your data. And whether it’s through innocent prompts or habitual oversharing, users are feeding these machines with information that, in the wrong hands, becomes a security time bomb. A recent Harmonic report (https://apo-opa.co/3Sw1K4N) found…

KnowBe4
Source: KnowBe4 |

Why Empowered People Are the Real Cyber Superpower – Not a Liability

System-based interventions – such as smart prompts, real-time nudges, and in-the-moment coaching – can slow users down at critical decision points, helping them make safer choices

It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems when you can just trick a human? And that is why…