J2 launches Home Secure
1 November 2018
Smart Home Automation
Information Security
News & Events
J2 Software has announced the launch of J2 Home Secure, aimed at protecting home/personal users from online fraud and cyber threats. John Mc Loughlin, CEO of J2 Software, says there is a growing trend in online fraud targeting consumers, which includes invoice fraud, fake adverts and refund scams.
“From the home/personal user perspective it can be quite a dilemma of ‘where do you begin’? We have online banking fraud, fake classifieds adverts, phishing scams, malware and viruses, ATM fraud, refund scams, fake invoices and that’s before we even get to advanced threats and most importantly – our children.”
He notes that the J2 Home Secure solution aims to deal with the fact that attacks are increasing and always evolving. “J2 Home Secure provides end point protection, Internet security and it offers protection up to R25 000 in the event of online fraud and theft where you suffer a direct financial loss. It provides Managed Cyber Security for home users.”
J2 Home Secure also offers protection against:
• EFT fraud
- Transfer of funds to third parties where the details of the payee have been manipulated.
- Transactions where a payees identity is stolen, falsified, fraudulently altered.
- 30% of the value of online classified transactions.
• EFT Duping
- EFT or deposit scam using altered POPs, deposit slips etc.
- When you are tricked into believing payment has been made into your account.
• Unauthorised transfer of funds:
- Funds transfer from account by person not authorised.
- Includes fraudulent use of your name, address, ID, bank account etc.
- Does not include funds by a person you know or have authorised to make a transfer.
“This product offers the modern consumer many compelling reasons to improve their security by having a managed cyber security service for home users. We also provide affordable layered security options to ensure that clients have securely backed up important files, encrypted sensitive data with the added advantage of having a single point of contact to help them setup their Office365 at home,” Mc Loughlin concludes.
For more information contact J2 Software, +27 87 238 1870, [email protected], www.j2.co.za
Further reading:
Reshaping South Africa’s built environment
Securex South Africa
Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.
Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.
Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.
Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.
Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.
Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA
News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.
Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.
Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions
News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.
Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.
Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence
Read more...