How to spot phishing, vishing and smishing

Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...

Deepfakes a growing threat to SA corporations

Artificial intelligence (AI) has now made it possible to wake up to a video of your CEO seemingly admitting to fraud or receiving an urgent audio message from your chief financial officer authorising a large, unexpected transaction, without any of it being real. By...

Align cybersecurity with ESG for sustainable security

As organisations navigate an increasingly complex digital landscape, the convergence of cybersecurity and Environmental, Social, and Governance (ESG) principles has emerged as a critical consideration. By Ryan Boyes, governance, risk and compliance officer at Galix...

Empowerment without support is a leadership illusion

Leaders often assume that delegation equals empowerment, only to be frustrated when delegated tasks end up back on their desks after some time. By Juanita Vorster, independent business advisor Unfortunately, more often than not, what is perceived as delegation is...

The strategic advantage of independent Citrix audits

Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments – spanning on-premises, hybrid, and multi-cloud architectures – can lead to...