Availability in the age of security risk

With ransomware attacks becoming increasingly prevalent, companies are more aware than ever for the need for effective cybersecurity measures. But despite this, not enough is being done to ensure the availability of data in the event of systems being compromised,...

The case for cyber insurance

South Africa has not come through recent cyber-attacks unscathed. When cyber criminals breach a network, it’s done with the malicious intent of gathering data: medical records, personal information, ID numbers and account details. The propensity and magnitude of...

Tips for selling to CISOs

Selling cyber security products and services is challenging at the best of times. Security, even though it is understood to be essential, tends to be a grudge purchase for most businesses. “Security is aimed at preventing a business from falling victim to a...

BDO advises risk assessment

In a new white paper published today, BDO’s global cybersecurity leadership group stresses the importance of businesses gaining an understanding of their unique risk profiles in order to ensure the right cyber insurance for their needs. Cyber insurance: managing...

Hacking humans

The easiest way to hack into a network is by exploiting the one vulnerability most often left unpatched — human nature, according to Michael Ferendinos, enterprise risk business unit head at Aon South Africa and Rudi Dicks, senior cyber consultant at BDO...

The risks of allowing smartphones at the bank …

Employees aren’t just bringing their devices into work — they’re living on them. Checking one’s phone is the first and last thing many do every day. With smartphones becoming constant companions, hackers are seeking every avenue available to...