Background screening checks a critical risk management tool

With South Africa’s struggling economy and high unemployment rates, background screening checks for employees are more important than ever – in this climate, companies are unwilling to take risks on new hires given the mismatch between skills needed and available...

The future of OT is about an integrated approach

Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...

Threats and solutions around OT, 4IR and cybercrime

The convergency of OT (operational technology) and IT in industrial environments offers numerous and tangible benefits. Plus, when 4IR technologies are added to the mix, the sky becomes the proverbial limit. By Hennie Colyn, direct sales executive Process Automation...

Your data was stolen – now what?

How would you know if someone breached your organisation’s systems and stole data? Ideally, you’d catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces...

Stay safe from SIM swap fraud

The last few years have seen a sharp rise in SIM swap fraud, placing the mobile and digital sectors at risk of disrepute. This can result in great implications for all the participants in the value chain, including mobile users, mobile operators, digital services, and...

Serious consequences for companies that invoice via email

Law firm ENSafrica was recently ordered to pay a cybercrime victim R5,5-million after a syndicate successfully hacked into a client’s email during a property transaction. The hackers altered the bank account number in a PDF invoice sent by the law firm,...