Protect your financial assets from unknown online threats

Issue 6 2023 Products & Solutions, Information Security, Financial (Industry)


Simon Campbell-Young.

It is essential for anyone with a bank account to understand the risks that come with online banking and how to protect against them. Cybercriminals are a formidable and pervasive threat that continue to loom over online banking and consumer bank accounts. These malicious actors employ a myriad of sophisticated techniques, such as hacking, phishing, spamming, card theft, online fraud, vishing, and keylogging, among others, to exploit unsuspecting individuals and gain unauthorised access to their financial resources.

Recognising the gravity of this issue, Simon Campbell-Young, co-founder of Digimune, an authorised Norton distributor in South Africa, emphasises the criticality of empowering consumers with the right tools to protect their assets and personal information.

“You need to see yourself as a human firewall,” he explains. “By being aware of cyber-threats and using intelligent solutions that provide automated protection, you can create an impenetrable barrier against the constantly evolving landscape of attacks.”

Cyberattacks are indeed prevalent and continuously changing. According to research conducted by PwC, criminals are continuously finding new ways to exploit vulnerabilities in online security. One such innovation is the web skimmer, which has become increasingly common in recent years. This includes a type of attack called “formjacking”, where hackers hijack virtual forms on websites. This technique allows cybercriminals to capture the payment details entered by consumers instead of the online store. All websites are susceptible to this risk.

“To protect yourself effectively, it is important to know what threats are out there and how to defend against them,” says Campbell-Young. “Your first step is to stay vigilant by asking yourself questions like: Is this website URL correct? Does this form look different? Have I set up my antivirus to check my online activity? With new viruses being launched on the internet every day, it is critical to ask these questions before making online purchases or entering your bank details anywhere.”

According to Statista, there were 5.5 billion malware attacks globally in 2022, which is higher than the previous year. The AV-Test Institute discovered over one billion malware programs installed worldwide, with 560 000 new malware applications being found every day. Consumers cannot keep up with the sheer volume of attacks and threats, which is why they must invest in software that can protect them.

“You need a platform that is always checking your systems, keeping up with the latest viruses, and applying all the necessary updates,” says Campbell-Young. “It should have a powerful engine that takes care of the basics and ensures you have the right layers of security in place. When it comes to protecting your personal assets and information from anywhere in the world, you want a solution has you covered. Whether you are working from home, doing your banking on the move, or travelling, you want a secure VPN that lets you surf the web with peace of mind.”

The landscape is challenging to navigate, but this does not mean people should give up on online banking or stop using digital solutions. Norton offers protections that are specifically designed to monitor your online activity and detect potential scams, phishing attempts, and identity manipulation tactics. These tools protect your digital assets across multiple devices and platforms, and they are constantly updating and evolving alongside the threats so your systems are protected in real time.

“Cybersecurity protections have come a long way. They do not just protect your devices anymore, but also shield you from the ever-present dangers lurking on the web,” concludes Campbell-Young. “These protections are like invaluable allies, working tirelessly to keep you safe from threats online. Investing in them is critical because they ensure your protection and security, no matter what you are doing on the internet.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.