Mar 31, 2025
A user’s messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam...
Mar 31, 2025
The long-awaited regulations introducing a general business-to-business (B2B) exclusion (although in this case a business-to-registered vendor exclusion) for the electronic services supplied from outside South Africa to specified recipients within the country were...
Mar 31, 2025
Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...
Mar 31, 2025
As investors around the world seek safe havens amidst global uncertainty, the gold price has surged to record highs March, with all indications pointing to a long-term rally. The yellow metal has returned over 40% in the past year in both ZAR and USD terms. Analysts...
Mar 28, 2025
Over the past decade, organisations have made positive strides in advancing gender diversity and equity, including promoting and recruiting more women into leadership roles. This is a welcome development, but recent data shows that the road ahead is still paved with...
Mar 28, 2025
South Africa is facing a particularly high prevalence of cyberattacks, emphasising the importance of prioritising cybersecurity in the region, writes Brett Skinner, business unit manager: cyber resilience at Datacentrix. The increasing sophistication of these...