subscribe: Daily Newsletter

 

Collaboration key to combat medical a...

Healthcare fraud, waste and abuse are some of the most complex forms of financial fraud to detect, monitor and prevent...

posted on: Mar 20, 2017 | author: Allan Davison

Businesses use trade credit to secure...

With South Africa’s current economic and trade environment remaining constrained and unpredictable, businesses...

posted on: Mar 16, 2017 | author: Allan Davison

Data breaches are a part of doing bus...

Data has become the lifeblood of modern life as everything from room temperatures and health records to banking...

posted on: Mar 14, 2017 | author: Allan Davison

Online banking fraud – consumer...

Incidents of online banking fraud continue to rise in South Africa as more consumers become comfortable with...

posted on: Mar 3, 2017 | author: Allan Davison

Tips to see your business through 201...

The beginning of the year is the perfect opportunity to give your business insurance portfolio a good review and...

posted on: Feb 15, 2017 | author: Allan Davison

CA strengthens security

CA Southern Africa has announced the new release of CA Technologies, CA Identity Suite, that includes integration with...

posted on: Feb 6, 2017 | author: Allan Davison

Building cyber resilient businesses f...

Juniper research has predicted that the rapid digitisation of consumers’ lives and enterprise records will...

posted on: Feb 3, 2017 | author: Allan Davison

Building resilience is key to managin...

The outcomes-based approach of King IV is a timely invitation for corporate South Africa to get better at managing...

posted on: Jan 11, 2017 | author: Allan Davison

Safeguard your business from cybercri...

From malware to phishing and from hacking to theft of data storage devices, the risks of falling victim to a security...

posted on: Jan 2, 2017 | author: Kathy Gibson

Data backups can save you from hacker...

Over the past few years, millions of PCs from around the world have been locked or had their files encrypted as a...

posted on: Dec 9, 2016 | author: Allan Davison

Risk spikes in dispersed enterprise e...

The enterprise business is moving out from behind its firewall into a dispersed bring your own device (BYOD), Internet...

posted on: Nov 30, 2016 | author: Allan Davison

Prevent employees from stealing IT as...

The vast range and volume of new devices being deployed in the marketplace makes it nearly impossible for companies to...

posted on: Nov 28, 2016 | author: Allan Davison

« Previous Entries