Andisa MatlalaMar 15, 20234 min5 Critical Tasks for Effective Industrial Control System (ICS) / Operation Technology (OT) SecurityIt is no secret that the attack surface of industrial control systems (ICS) is growing quickly. Organizations in critical infrastructure...
zulu219Mar 2, 20232 minWhat are the advantages of outsourcing Disaster Recovery?In the current digital environment, businesses rely largely on technology to operate efficiently. With organizations of all sizes...
The Lockdown IT CyberDefence TeamMar 2, 20232 minLastPass employee (DevOps Engineer) home computer hackedLastPass announced on Monday that the same threat actor that gained access to partially encrypted login data also hacked an employee's...
Andisa MatlalaMar 1, 20237 min“Bullying Beyond the Classroom: Cyberbullying a Growing Threat in the Digital Age”Q & A Session with the Director of Cyber Defence at Lockdown IT. In today’s world, social media and technology have become an integral...
Arno LivensMar 1, 20234 minHow to convince management to get a budget for a cybersecurity strategy in your organisation?Anyone who has presented a cyber security strategy and requested additional funding or budget to implement this into any organisation...