Resources for SA Businesses
That Take Cyber Risk Seriously.
Threat briefings, POPIA compliance guides, technical explainers, and industry reports — all written for South African business leaders, not security engineers.
Content Categories
New content published at minimum twice per month across each category.
Intelligence & Guides
South Africa Cyber Threat Report — Q1 2025
577 cyberattacks per hour. R49 million average breach cost. 34.5 million compromised accounts in Q1 2024 alone. This briefing covers the major incidents, emerging threat actors, and the sectors most at risk entering 2025.
What the 2025 POPIA Amendments Mean for South African SMEs
Random SME audits have begun. The mandatory e-Services breach reporting portal is live. Third-party vendor liability is now explicitly enforced. Here is what changed and what you need to do before your next audit.
What Is Ransomware-as-a-Service — and Why It Targets South Africa
Ransomware used to require technical expertise to deploy. Today, criminal groups sell ready-to-use ransomware kits to affiliates who earn a percentage of each ransom collected. Here is how it works — and how to stop it.
POPIA Breach Reporting Step-by-Step: What To Do in the First 24 Hours
You have just discovered a data breach. The clock is now running. POPIA requires you to report it to the Information Regulator as soon as reasonably possible. This guide walks you through every step.
How BaitHive Decoy Would Have Stopped the Transnet Ransomware Attack
Transnet's 2021 ransomware attack crippled SA port operations for days. Here is a technical breakdown of how our deception mesh would have detected and contained the attack at the initial reconnaissance phase.
How DNS Filtering Protects Your Business — Without Touching Your Devices
ShenDNS blocks malicious connections before your computer even loads a webpage. No software installation. No performance impact. Here is how DNS-layer protection works and why it matters for South African SMEs.
What SA Businesses Are Searching For
Reading about threats is the first step. The second is finding yours.
Our free vulnerability scan tells you what attackers already know about your business — in 24 hours, for free.