Protect your financial assets from unknown online threats

Issue 6 2023 Products & Solutions, Information Security, Financial (Industry)


Simon Campbell-Young.

It is essential for anyone with a bank account to understand the risks that come with online banking and how to protect against them. Cybercriminals are a formidable and pervasive threat that continue to loom over online banking and consumer bank accounts. These malicious actors employ a myriad of sophisticated techniques, such as hacking, phishing, spamming, card theft, online fraud, vishing, and keylogging, among others, to exploit unsuspecting individuals and gain unauthorised access to their financial resources.

Recognising the gravity of this issue, Simon Campbell-Young, co-founder of Digimune, an authorised Norton distributor in South Africa, emphasises the criticality of empowering consumers with the right tools to protect their assets and personal information.

“You need to see yourself as a human firewall,” he explains. “By being aware of cyber-threats and using intelligent solutions that provide automated protection, you can create an impenetrable barrier against the constantly evolving landscape of attacks.”

Cyberattacks are indeed prevalent and continuously changing. According to research conducted by PwC, criminals are continuously finding new ways to exploit vulnerabilities in online security. One such innovation is the web skimmer, which has become increasingly common in recent years. This includes a type of attack called “formjacking”, where hackers hijack virtual forms on websites. This technique allows cybercriminals to capture the payment details entered by consumers instead of the online store. All websites are susceptible to this risk.

“To protect yourself effectively, it is important to know what threats are out there and how to defend against them,” says Campbell-Young. “Your first step is to stay vigilant by asking yourself questions like: Is this website URL correct? Does this form look different? Have I set up my antivirus to check my online activity? With new viruses being launched on the internet every day, it is critical to ask these questions before making online purchases or entering your bank details anywhere.”

According to Statista, there were 5.5 billion malware attacks globally in 2022, which is higher than the previous year. The AV-Test Institute discovered over one billion malware programs installed worldwide, with 560 000 new malware applications being found every day. Consumers cannot keep up with the sheer volume of attacks and threats, which is why they must invest in software that can protect them.

“You need a platform that is always checking your systems, keeping up with the latest viruses, and applying all the necessary updates,” says Campbell-Young. “It should have a powerful engine that takes care of the basics and ensures you have the right layers of security in place. When it comes to protecting your personal assets and information from anywhere in the world, you want a solution has you covered. Whether you are working from home, doing your banking on the move, or travelling, you want a secure VPN that lets you surf the web with peace of mind.”

The landscape is challenging to navigate, but this does not mean people should give up on online banking or stop using digital solutions. Norton offers protections that are specifically designed to monitor your online activity and detect potential scams, phishing attempts, and identity manipulation tactics. These tools protect your digital assets across multiple devices and platforms, and they are constantly updating and evolving alongside the threats so your systems are protected in real time.

“Cybersecurity protections have come a long way. They do not just protect your devices anymore, but also shield you from the ever-present dangers lurking on the web,” concludes Campbell-Young. “These protections are like invaluable allies, working tirelessly to keep you safe from threats online. Investing in them is critical because they ensure your protection and security, no matter what you are doing on the internet.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.