KnowBe4
Source: KnowBe4 |

Heritage, identity, and the risk of digital mimicry

Criminals consistently flock to where public interest is highest, and the increased social media activity around Heritage Day makes it a prime hunting ground

As South Africans recently celebrated a day of communal braais and shared national pride, our digital lives inevitably mirrored our physical ones. We posted family photos, shared traditions, and celebrated our diverse cultures online. But in this outpouring of celebration, we risked exposing the very essence of our identity to…

KnowBe4
Source: KnowBe4 |

Cluttered desktops: The ‘I might need this someday’ mindset is creating a cybersecurity nightmare

Unlike physical clutter, digital hoarding creates an invisible risk – people may not even know what data they’re storing or where

Digital hoarding poses a significant and often underestimated cybersecurity risk that extends far beyond a simple productivity issue, argues Anna Collard, SVP of Content Strategy and CISO Advisor at KnowBe4 Africa (http://www.KnowBe4.com/). Like a garage slowly filling with forgotten boxes, our digital workspaces are becoming repositories of unmanaged data. We…

KnowBe4
Source: KnowBe4 |

Hacking kindness: Cybercriminals exploiting our best intentions

Emotional content – both negative and positive – is effective in manipulation

Cybercriminals are not only using fear and urgency to exploit their victims.  Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited, warns Anna Collard, SVP of Content Strategy and CISO Advisor at KnowBe4 Africa (http://www.KnowBe4.com/).  “Emotional manipulation is a common tactic in…

KnowBe4
Source: KnowBe4 |

Beware the Bring Your Own Device (BYOD) blind spot: Personal devices are a complicated weak link

Some useful technical controls include employees having strong passwords, multifactor authentication (MFA), encryption, endpoint security and patching

Up to 84% of organisations globally practise bring your own device (BYOD) in some form, but only half of them officially allow it, according to a recent report (https://apo-opa.co/498rnlG). While the convenience and cost saving of employees’ using their own personal devices for work is undeniable, there are many security…

KnowBe4
Source: KnowBe4 |

Cybersecurity, gamified: Can fun actually build better habits and protect users?

Applying game-design elements, such as points, badges, leaderboards and rewards, to cybersecurity training taps into our natural desire for achievement, competition and progress

Traditional cybersecurity and compliance training can be dull as dishwater, which can lead to poor engagement and low retention among employees. Gamification, if done well, offers a refreshing alternative, transforming boring modules into interactive experiences that foster real behavioural change and strengthen your organisation’s overall security posture, argues KnowBe4 Africa’s Anna…

KnowBe4
  • Multimedia content

  • Images (1)
    • Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa
  • All (1)
Source: KnowBe4 |

New KnowBe4 Report Finds Key African Industries May Be Dangerously Overestimating Cyber Defences

The KnowBe4 Africa Human Risk Management Report 2025 highlights worrying mismatch between perception and reality in cybersecurity

KnowBe4 (www.KnowBe4.com), the world-renowned cybersecurity platform that comprehensively addresses human risk management, today released its new report “Africa Human Risk Management Report 2025”. The report reveals a mismatch between employer perceptions and employee experience of organisational cybersecurity in key African industries – with potentially costly consequences. The report (https://apo-opa.co/45TKgqm) captures insights…

KnowBe4
Source: KnowBe4 |

From perception to protection: What Africa’s Chief Information Security Officers (CISOs) don’t know about employees could cost them

The KnowBe4 Africa Human Risk Management Report 2025 reveals mismatches between leadership belief and employee reality

Cybersecurity in Africa is entering a new phase. As organisations mature their defences and invest in security awareness training (SAT), a difficult-to-spot, but critical gap is emerging – not between tools and cyber threats, but between what leaders believe about their employees, and what they actually experience. The KnowBe4 Africa…

KnowBe4
Source: KnowBe4 |

From London to Lagos: Why retailers everywhere must prepare for the next wave of cyberattacks

Recent cyberattacks on major UK retailers like Marks & Spencer and the Co-op aren’t just headline-grabbing stories, they provide a cautionary tale of the evolving threat landscape facing modern retail globally; For African retailers accelerating digital transformation, these incidents serve as a crucial case study in what can go wrong when uptime – not just data – is under attack

In April, two of Britain’s biggest retailers got hit by a massive cyberattack by the notorious Scattered Spider group, leading to substantial financial losses, operational disruptions and compromised customer data (http://apo-opa.co/40O1faD). M&S suffered losses of £300 million (http://apo-opa.co/40O1gLJ) (roughly R7.3 billion) due to the attack, with supply chains affected for…

KnowBe4
Source: KnowBe4 |

Social Engineering 2.0: When artificial intelligence becomes the ultimate manipulator

From fake bank alerts to long-lost Nigerian princes, these scams have traditionally relied on generic hooks and low-effort deceit. But that’s changed, and continues to

Once the domain of elite spies and con artists, social engineering is now in the hands of anyone with an internet connection – and AI is the accomplice. Supercharged by generative tools and deepfake technology, today’s social engineering attacks are no longer sloppy phishing attempts. They’re targeted, psychologically precise, and…

KnowBe4
Source: KnowBe4 |

Perilous prompts: How generative Artificial Intelligence (AI) is leaking companies' secrets

Seemingly benign details can be stitched into detailed profiles by cybercriminals or data brokers – fuelling targeted phishing, identity theft, and sophisticated social engineering

Beneath the surface of GenAI’s outputs lies a massive, mostly unregulated engine powered by data – your data. And whether it’s through innocent prompts or habitual oversharing, users are feeding these machines with information that, in the wrong hands, becomes a security time bomb. A recent Harmonic report (https://apo-opa.co/3Sw1K4N) found…