Healthy suspicion can stop phishing attacks

Your shipment is waiting, but it needs your approval. Your subscription payment has failed, but your loyalty qualifies you for three free months. Payment is due on this account – please use these bank details. If you are tired of receiving these (unsolicited)...

What security monitoring can tell you about your business

Security monitoring technology continuously logs and analyses data from network points and nodes, enabling security teams to detect and respond to incidents faster and, while this is crucial, it’s not the full extent of its usefulness. By offering continuous...

Innovation, competition fueling disruption in trade credit insurance

South Africa’s trade credit insurance offerings have largely retained their European roots making them less than ideal for the local market, says Gareth Joubert, MD at Hollard Trade Credit. “We have a matured trade credit insurance market, but the product...
African organisations must adopt an active defence posture

African organisations must adopt an active defence posture

Considering the constantly evolving and increasingly sophisticated cyber threat landscape, the state of cybersecurity, resilience and data protection in Africa potentially has global implications. By Kate Mollett, regional director of South Africa and SADC at...

Email best practices under the spotlight

Just about every organisation in the world relies on email. And yet, securing this mission-critical platform is often not treated with the diligence that is required. One of the best ways to mitigate against the threat of compromise is a combination of user education,...

Understand and navigate AI risks

The risks associated with using artificial intelligence (AI) systems can be extensive and have severe business impact if left unaddressed. By Nevellan Moodley, head of financial services technology at BDO South Africa AI is being used everywhere, across every business...