Red faces are not unusual at social media networks, where hacking and manipulation of the masses is like a contact sport. As soon as one vulnerability is covered, the attackers force their way through the narrowest inkling of a weakness somewhere else.

The problem is that the focus is almost entirely on protecting access to hardware and software. Securing the people behind these systems? Not so much...

Subscribe now to unlock this article.

Support BusinessLIVE’s award-winning journalism for R129 per month (digital access only).

There’s never been a more important time to support independent journalism in SA. Our subscription packages now offer an ad-free experience for readers.

Cancel anytime.

Would you like to comment on this article?
Sign up (it's quick and free) or sign in now.

Speech Bubbles

Please read our Comment Policy before commenting.