Frequent Questions

Securely navigating the vast cyberspace can be daunting. 

Understanding the security risks and threats to your digital assets and online identity can be even more challenging.

Here are some frequently asked questions we often encounter. 

If you have any specific questions about our products and services, we'll gladly assist you personally.

Ask Us Directly

Frequently Asked Questions

Cybersecurity

Answers to a few questions around cyberthreats and general internet risk prevention

Cybersecurity is the protection of systems, networks, and programs from digital attacks via the internet.

A cybersecurity risk assessment is an assessment of an individual’s or organisation's risk of being subject to a cyberattack, followed by a risk score. The risk assessment identifies areas of weakness and highlights these with recommended actions to improve the overall risk score.

Malware, phishing, MITM, SQL injection, password attacks, and denial of service are some of the most common types of cybersecurity threats.

Common types of malware includes viruses, worms, trojan horses, spyware, ransomware and keyloggers – and there are many more.

A firewall is a security system designed to prevent unauthorised access into or out of a computer network. Firewalls are often used to make sure internet users without access are not able to interface with private networks or intranets connected to the internet.

Password attacks are one of the most common forms of corporate and personal data breach. A password attack is simply when a hacker attempts to steal your password. In 2020, 81% of data breaches were due to compromised credentials.

Phishing refers to innovative scams to obtain data that can lead to corporate data breaches, credit card fraud, and identity theft. With phishing, the potential for reputational damage, legal action, and data privacy fines are high.

An HTTP status code is a server response to a browser’s request. When you visit a website, your browser sends a request to the site’s server, and the server then responds to the browser’s request with a three-digit code – the HTTP status code. These status codes are the internet equivalent of a conversation between your browser and the server. They communicate whether things between the two are healthy or compromised.

DNS hijacking happens when a third party forwards a company’s web visitors to fake websites to steal login credentials and confidential data.

DNS cache refers to saved internet queries. Poisoning thereof means rerouting these saved internet queries to malicious websites by cybercriminals.

Two factory authentication is essential to web security, because it immediately reduces the risks associated with compromised passwords. If a password is hacked, guessed, or even phished, that's no longer enough to give an intruder access. Without approval at the second factor, a password alone is useless.

Hackers require personal details, such as your full name, home address, cell phone number, e-mail address, credit card number, etc. Hackers use this data to impersonate you and commit theft, like using your credit card or taking loans in your name.

Webcams are prone to hacking, which can lead to a privacy breach with serious consequences. With Digimune’s DigiProtect product, you are protected from becoming victim to such privacy breaches.

Unfortunately, there is no way for anyone to remove information that gets posted on the dark web. With Digimune’s Monitoring products, you are able to monitor your personal information and be alerted in the event that personal information gets leaked onto the dark web. When this occurs, we recommend certain actions, such as changing your password or alerting your bank and changing your account or credit card information.

We offer comprehensive cyberprotection and remediation services to guard users against cyberbullying via our DigiCare service offering.

Frequently Asked Questions

Digimune Products

Answers to a few questions around our cybersecurity products and services

Yes, Digimune prevents theft of personal information, such as login credentials, account details and credit card numbers.

No, however our restitution services will provide you with access to our panel of legal practitioners to assist you with getting your identity recovered.

Yes, if you are an existing client with the applicable product, Digimune can assist you in getting the impersonating account removed on Facebook, Instagram, Twitter, LinkedIn or YouTube.

DigiCare restitution services offer the necessary legal action to protect and secure your rights. Your infringed rights, protected by us, must be related to the fraudulent use of your identity following an identity theft, or a cyberbullying, cyberstalking and cyber harassment incident.

Contact us to lodge an intent to claim, as soon as possible after the incident but within 30 (thirty) days of the discovery. Follow the claims process steps as explained in our restitution terms.

Contact us to lodge an intent to claim, as soon as possible after the incident but within 30 (thirty) days of the discovery. Follow the claims process steps as explained in our restitution terms.

The DigiCare warranty covers losses on a device protected by us, due to a security breach we could not defend. You are covered for a corrupted device due to a hacking incident, cyber extortion due to ransomware, and loss of funds due to your data being hacked. You can read more here.

Unfortunately not, as this primary cause of loss is the theft of the machine, and not the failure of the software to protect it.

Yes, the warranty is solely applicable to Digimune cybersecurity software products. It is the additional value we provide – to prove our confidence in our ability to offer you premium cyberthreat protection.

Upon purchase, you will receive an e-mail with the activation / registration codes applicable to the product / bundle you purchased, along with instructions and guides on installing and activating the security service.

Please check your junkmail / spam folder, as the onboarding e-mail contains links that may be deemed as spam or unsolicited e-mail. If no e-mail has been received, please reach out to support@digimune.com with your Order ID and we will contact you.

Kindly contact us at support@digimune.com and one of our friendly support agents will be in touch to resolve your issues.

Digimune uses 2Checkout as payment gateway provider for all online transactions on digimune.com. 2Checkout is PCI Level 1 certified – the highest level of certification possible. The Payment Card Industry Data Security Standard was developed to protect consumers and their data no matter where they shop or what channel they use. Your credit card details will be safe.

Yes! Your DigiCare warranty will be invalid, as your software will not be up to date – which is a requirement for the DigiCare warranty.

Stay safe. Stay informed. 
Subscribe to our newsletter.

Sign Up

General Enquiry

Connect With Us


connect@digimune.com


Contact us via e-mail or complete the form and the correct department will get back to you.

SOUTH AFRICA
Workshop 17, 32 Kloof Street, Cape Town  8001

UNITED KINGDOM
C/O Haggards, Heathmans House, 19 Heathmans Road, London  SW6 4TJ


Digimune (Pty) Ltd:  2020/100553/07 

NAME

Get 30% off your first purchase

X