2TS

Michael Pretorius

Peter Green Chilled | Ransomware Attack

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack Michael Pretorius June 5, 2025 Blog What Happened | A Cold Chain Brought To A Halt By Ransomware.  In May 2025, UK-based logistics company Peter Green Chilled, a supplier for major supermarket chains like Tesco, Aldi, and Sainsbury’s – […]

Preventing Digital Disruption in the Cold Supply Chain | Lessons from the Peter Green Ransomware Attack Read More »

SAA Cyberattack

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Michael Pretorius May 12, 2025 Blog A Wake-Up Call for National Infrastructure On May 3, 2025, South African Airways (SAA) experienced a significant cyberattack that disrupted its website, mobile application, and several internal operational systems. The breach prompted immediate action, including the activation of disaster management

Safeguarding South Africa’s Skies: Lessons from the SAA Cyberattack Read More »

Crypto Currency Heist

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum 

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum  Michael Pretorius April 29, 2025 Blog Cryptocurrency thefts have become a growing threat in the digital finance industry, but the Bybit crypto hack of 2025 has shattered records as the largest digital heist in history, with hackers making off with a staggering $1.5 billion

The Bybit Cryptocurrency Heist: How Hackers Stole $1.5 Billion in Ethereum  Read More »

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Michael Pretorius March 20, 2025 Blog Cybersecurity threats are evolving rapidly, and one of the most devastating attacks in recent history was NotPetya. Initially disguised as ransomware, NotPetya was, in reality, a destructive cyber weapon that targeted Ukraine in 2017 but quickly spread across the globe.

How the NotPetya Cyberattack Exposed Vulnerabilities in Critical Infrastructure Read More »

From Vulnerability to Victory: Supply Chain Security for SMEs

Draft From Vulnerability to Victory: Supply Chain Security for SMEs Michael Pretorius January 10, 2025 Blog A chain is only as strong as its weakest link. Therefore, small businesses need to solidify every aspect of their supply chain. Over the years, you will likely have heard of many supply chain breaches due to third-party organisations.

From Vulnerability to Victory: Supply Chain Security for SMEs Read More »

Data Breach Prevention and Response: Building an Effective Incident Response Plan

Draft Data Breach Prevention and Response: Building an Effective Incident Response Plan Michael Pretorius January 10, 2025 Blog With the ever-increasing reliance on digital systems and the rising sophistication of cyber threats, organisations face a daunting challenge in protecting their sensitive data from potential breaches. A data breach can have far-reaching consequences, including financial losses,

Data Breach Prevention and Response: Building an Effective Incident Response Plan Read More »

Mobile Device Security: Protecting Your Data on the Go

Draft Mobile Device Security: Protecting Your Data on the Go Michael Pretorius January 10, 2025 Blog In an era where mobile devices have become an integral part of our lives, ensuring their security has never been more critical. The increasing reliance on smartphones and tablets for communication, productivity, and financial transactions has made them enticing

Mobile Device Security: Protecting Your Data on the Go Read More »

Unleashing the Power of Zero-Trust Security: Safeguarding Networks in an Evolving Threat Landscape

Draft Unleashing the Power of Zero-Trust Security: Safeguarding Networks in an Evolving Threat Landscape Michael Pretorius January 10, 2025 Blog Imagine a scenario where your company’s most sensitive data, including financial records, customer information, and trade secrets, falls into the hands of cybercriminals. This unfortunate event occurred due to a simple phishing email that deceived

Unleashing the Power of Zero-Trust Security: Safeguarding Networks in an Evolving Threat Landscape Read More »

Mitigating Insider Threats: Strategies for Protecting Data Security and Business Continuity

Draft Mitigating Insider Threats: Strategies for Protecting Data Security and Business Continuity Michael Pretorius January 10, 2025 Blog In today’s interconnected digital landscape, organisations face a multitude of cybersecurity risks, and not all of them originate from external sources. Insider threats, which involve malicious or negligent actions by individuals within an organisation, pose a significant

Mitigating Insider Threats: Strategies for Protecting Data Security and Business Continuity Read More »