Empowered people are the real cyber superpower

It’s time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They’re not. They’re simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems...
E-commerce is changing the traditional insurance distribution model

E-commerce is changing the traditional insurance distribution model

In today’s evolving digital economy, a quiet revolution is transforming how consumers access insurance protection and how service providers are enhancing customer experience and revenue streams. By Carl Moodley, CIO of Genric Insurance Company Embedded insurance...

How to spot phishing, vishing and smishing

Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...

The strategic advantage of independent Citrix audits

Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments – spanning on-premises, hybrid, and multi-cloud architectures – can lead to...

How working from home affects your insurance

While remote and hybrid work arrangements have recently started to decline as the return-to-office trend has gained momentum around the globe, many companies continue to embrace these models to attract and retain top talent. The working-from-home option does impact...

How to become a threat-resilient organisation

With the continent’s rapid digital transformation, African businesses are being exposed to increasingly complex cyber threats. As their digital footprint grows, so too does the potential for cyberattacks, writes Vinay Hiralall, chief commercial officer of Liquid C2....