{"id":141268,"date":"2021-08-31T13:03:10","date_gmt":"2021-08-31T13:03:10","guid":{"rendered":"https:\/\/www.regenesys.net\/reginsights\/?p=141268"},"modified":"2021-11-25T13:35:56","modified_gmt":"2021-11-25T13:35:56","slug":"how-to-protect-yourself-against-cybercrime","status":"publish","type":"post","link":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime","title":{"rendered":"How to Protect Yourself Against Cybercrime"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text single_style=&#8221;&#8221;]<span data-preserver-spaces=\"true\">The recent cyberattack on Transnet\u2019s computer systems, which affected the container handling its operations and resulted in ships diverting from South African ports, is still fresh in our memories.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Cybercriminals do not only target large multinationals. It does not matter if you are an individual, large, or small company, or even a government entity. As long as you have a virtual identity, your information is a potential target of a cyber attacker.<\/span><\/p>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/reg-insights-38.jpg\"><img decoding=\"async\" class=\"aligncenter wp-image-141275 size-large\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/reg-insights-38-1024x576.jpg\" alt=\"Cybersecurity\" width=\"770\" height=\"433\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/reg-insights-38-1024x576.jpg 1024w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/reg-insights-38-300x169.jpg 300w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/reg-insights-38-1536x864.jpg 1536w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>ITLaw<span data-preserver-spaces=\"true\">\u00a0defines cybercrime as follows:<\/span><\/p>\n<blockquote><p><em><span data-preserver-spaces=\"true\">\u201cCybercrime refers to criminal activities that specifically target a computer or network for damage or infiltration and refers to the use of computers as tools to conduct criminal activities.\u201d<\/span><\/em><\/p><\/blockquote>\n<p><span data-preserver-spaces=\"true\">The Cybercrimes Act no 19 of 2020, was promulgated and gazetted on the 1st of June 2021. This Act aims to criminalise offences relating to cybercrime and introduces a framework aimed at the detection, prevention, mitigation, and investigation of cybercrimes.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">In summary, the Cybercrimes Act refers to cybercrime as:\u00a0<\/span><\/h2>\n<ul>\n<li><span data-preserver-spaces=\"true\">The unlawful access to computer systems or computer data storage devices;<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The unlawful interception of and interference with data;<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Unlawful acts in respect of software or hardware tools;<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The unlawful acquisition, possession, provision, receipt, or use of a password; and<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Online fraud, forgery, and extortion.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">Our virtual identity is an essential element of our everyday life and criminals use different tactics to obtain personal individual information, information regarding clients, and information regarding suppliers.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Cybercriminals&#8217; tactics to obtain information<\/span><\/h2>\n<ul>\n<li><span data-preserver-spaces=\"true\">Email and internet fraud<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Phishing scams<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Theft and use of your personal information<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Theft of your card payment information<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ransomware attacks<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">The impact of a cyber-attack on a company can be detrimental and results in business interruption, reputational damage, and financial loss. The consequences of a cyberattack could also expose the victim to potential claims in terms of the\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.gov.za\/sites\/default\/files\/gcis_document\/201409\/3706726-11act4of2013protectionofpersonalinforcorrect.pdf\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">POPI Act, Act no 4 of 2013<\/span><\/a><span data-preserver-spaces=\"true\">, effective from 1 July 2021, due to unauthorised disclosure of client personal information.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">In the Transnet debacle, their computer systems were down for more than a week which resulted not only in huge financial loss to the state-owned entity, but also had a profound impact on the South African economy.<\/span><\/p>\n<p><a class=\"editor-rtfLink\" href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2021\/03\/02\/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021\/?sh=32d03e4d58d3\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Cyber-attacks<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0have increased and are projected to occur every 11 seconds this year.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">On an individual level, cybercriminals can obtain access to your personal information and gain access to your financial information and money.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ways you can protect yourself against cybercrime\u00a0<\/span><\/strong><\/h2>\n<ul>\n<li><span data-preserver-spaces=\"true\">Using strong passwords<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Change your passwords regularly<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ensure that you have updated security software<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Do not open suspicious emails<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Do not share your password<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span data-preserver-spaces=\"true\">Insurance companies have identified the need and have developed various insurance products to cover individuals and commercial entities against a multitude of risks associated with cybercrime.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Should you consider protecting yourself against cybercrime, please contact our team at MyWealth Investments, at\u00a0<\/span><a class=\"editor-rtfLink\" href=\"mailto:info@mywealthinvestments.co.za\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">info@mywealthinvestments.co.za<\/span><\/a><span data-preserver-spaces=\"true\">.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Stay cyber-safe and remember:<\/span><em><span data-preserver-spaces=\"true\">\u00a0\u201cPasswords are like underwear: Don\u2019t let people see it, change it very often and you shouldn\u2019t share it with strangers!\u201d \u2013 Chris Pirillo<\/span><\/em>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text single_style=&#8221;&#8221;]The recent cyberattack on Transnet\u2019s computer systems, which affected the container handling its operations and resulted in ships diverting from South African ports, is still fresh in our memories. Cybercriminals do not only target large multinationals. It does not matter if you are an individual, large, or small company, or even a government entity.<\/p>\n","protected":false},"author":35,"featured_media":141274,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[1,8],"tags":[],"country":[],"class_list":{"0":"post-141268","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-a-z-topics","8":"category-digital-transformation-and-technology"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Protect Yourself Against Cybercrime - RegInsights<\/title>\n<meta name=\"description\" content=\"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Yourself Against Cybercrime - RegInsights\" \/>\n<meta property=\"og:description\" content=\"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime\" \/>\n<meta property=\"og:site_name\" content=\"RegInsights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RegenesysBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-31T13:03:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-25T13:35:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regenesys Business School\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RegenesysB\" \/>\n<meta name=\"twitter:site\" content=\"@RegenesysB\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regenesys Business School\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime\"},\"author\":{\"name\":\"Regenesys Business School\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/823fd0f857d1c56e62ddd8056be5863e\"},\"headline\":\"How to Protect Yourself Against Cybercrime\",\"datePublished\":\"2021-08-31T13:03:10+00:00\",\"dateModified\":\"2021-11-25T13:35:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime\"},\"wordCount\":506,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/newsletter-20.png\",\"articleSection\":[\"A - Z Topics\",\"Digital Transformation and Technology\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime\",\"name\":\"How to Protect Yourself Against Cybercrime - RegInsights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/newsletter-20.png\",\"datePublished\":\"2021-08-31T13:03:10+00:00\",\"dateModified\":\"2021-11-25T13:35:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/823fd0f857d1c56e62ddd8056be5863e\"},\"description\":\"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#primaryimage\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/newsletter-20.png\",\"contentUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/newsletter-20.png\",\"width\":1000,\"height\":300,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/how-to-protect-yourself-against-cybercrime#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Yourself Against Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#website\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/\",\"name\":\"RegInsights\",\"description\":\"Thought Leadership\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/823fd0f857d1c56e62ddd8056be5863e\",\"name\":\"Regenesys Business School\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/cropped-Regenesys-favicon-150x150.png\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/cropped-Regenesys-favicon-150x150.png\",\"contentUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/cropped-Regenesys-favicon-150x150.png\",\"caption\":\"Regenesys Business School\"},\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/author\\\/satishmishra\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Yourself Against Cybercrime - RegInsights","description":"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime","og_locale":"en_US","og_type":"article","og_title":"How to Protect Yourself Against Cybercrime - RegInsights","og_description":"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails","og_url":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime","og_site_name":"RegInsights","article_publisher":"https:\/\/www.facebook.com\/RegenesysBusinessSchool\/","article_published_time":"2021-08-31T13:03:10+00:00","article_modified_time":"2021-11-25T13:35:56+00:00","og_image":[{"width":1000,"height":300,"url":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png","type":"image\/png"}],"author":"Regenesys Business School","twitter_card":"summary_large_image","twitter_creator":"@RegenesysB","twitter_site":"@RegenesysB","twitter_misc":{"Written by":"Regenesys Business School","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#article","isPartOf":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime"},"author":{"name":"Regenesys Business School","@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/823fd0f857d1c56e62ddd8056be5863e"},"headline":"How to Protect Yourself Against Cybercrime","datePublished":"2021-08-31T13:03:10+00:00","dateModified":"2021-11-25T13:35:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime"},"wordCount":506,"commentCount":0,"image":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#primaryimage"},"thumbnailUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png","articleSection":["A - Z Topics","Digital Transformation and Technology"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime","url":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime","name":"How to Protect Yourself Against Cybercrime - RegInsights","isPartOf":{"@id":"https:\/\/www.regenesys.net\/reginsights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#primaryimage"},"image":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#primaryimage"},"thumbnailUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png","datePublished":"2021-08-31T13:03:10+00:00","dateModified":"2021-11-25T13:35:56+00:00","author":{"@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/823fd0f857d1c56e62ddd8056be5863e"},"description":"There are ways of protecting yourself against Cybersecurity. Use strong passwords. Change passwords regularly. Do not open suspicious emails","breadcrumb":{"@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#primaryimage","url":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png","contentUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png","width":1000,"height":300,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.regenesys.net\/reginsights\/how-to-protect-yourself-against-cybercrime#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.regenesys.net\/reginsights\/"},{"@type":"ListItem","position":2,"name":"How to Protect Yourself Against Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.regenesys.net\/reginsights\/#website","url":"https:\/\/www.regenesys.net\/reginsights\/","name":"RegInsights","description":"Thought Leadership","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regenesys.net\/reginsights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/823fd0f857d1c56e62ddd8056be5863e","name":"Regenesys Business School","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2022\/06\/cropped-Regenesys-favicon-150x150.png","url":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2022\/06\/cropped-Regenesys-favicon-150x150.png","contentUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2022\/06\/cropped-Regenesys-favicon-150x150.png","caption":"Regenesys Business School"},"url":"https:\/\/www.regenesys.net\/reginsights\/author\/satishmishra"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"landscape":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"portraits":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-150x45.png",80,24,true],"medium":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-300x90.png",300,90,true],"large":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",770,231,false],"1536x1536":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"2048x2048":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"post-thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-270x180.png",270,180,true],"contentberg-main":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-770x300.png",770,300,true],"contentberg-main-full":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",1000,300,false],"contentberg-slider-stylish":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-900x300.png",900,300,true],"contentberg-slider-carousel":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-370x300.png",370,300,true],"contentberg-slider-grid-b":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-554x300.png",554,300,true],"contentberg-slider-grid-b-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-306x300.png",306,300,true],"contentberg-slider-bold-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-150x150.png",150,150,true],"contentberg-grid":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-370x245.png",370,245,true],"contentberg-list":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-260x200.png",260,200,true],"contentberg-list-b":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-370x300.png",370,300,true],"contentberg-thumb":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-87x67.png",87,67,true],"contentberg-thumb-alt":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-150x150.png",150,150,true],"gform-image-choice-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",300,90,false],"gform-image-choice-md":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",400,120,false],"gform-image-choice-lg":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20.png",600,180,false],"web-stories-poster-portrait":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-640x300.png",640,300,true],"web-stories-publisher-logo":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-96x96.png",96,96,true],"web-stories-thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2021\/08\/newsletter-20-150x45.png",150,45,true]},"rttpg_author":{"display_name":"Regenesys Business School","author_link":"https:\/\/www.regenesys.net\/reginsights\/author\/satishmishra"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.regenesys.net\/reginsights\/category\/a-z-topics\" rel=\"category tag\">A - Z Topics<\/a> <a href=\"https:\/\/www.regenesys.net\/reginsights\/category\/a-z-topics\/digital-transformation-and-technology\" rel=\"category tag\">Digital Transformation and Technology<\/a>","rttpg_excerpt":"[vc_row][vc_column][vc_column_text single_style=&#8221;&#8221;]The recent cyberattack on Transnet\u2019s computer systems, which affected the container handling its operations and resulted in ships diverting from South African ports, is still fresh in our memories. Cybercriminals do not only target large multinationals. It does not matter if you are an individual, large, or small company, or even a government entity.","_links":{"self":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts\/141268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/comments?post=141268"}],"version-history":[{"count":0,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts\/141268\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/media\/141274"}],"wp:attachment":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/media?parent=141268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/categories?post=141268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/tags?post=141268"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/country?post=141268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}