Outsourcing the policy administration function

Policy administration is a fundamental business function for any insurer. The stakes are high in ensuring consistent customer service delivery across the operational value chain; failure could result in complaints being lodged with the ombudsman, reputational damage,...

Encrypted traffic: making what’s vulnerable more visible

Dealing with encrypted traffic can be complex, costly, and disruptive. The problem escalates immeasurably if you are operating blind to cyber threats, which is basically what businesses are doing without a comprehensive SSL/TLS strategy in place. By Simon McCollough,...

The growing imperative for data science governance

There have been few days this year in which some aspect of client data protection has not featured in international news. By Dr Mark Nasila, chief analytics officer: consumer banking and chief risk officer at First National Bank The size and potentially devastating...

Be in the driving seat of your fleet security

The transport sector plays a key role in GDP contribution in the local and global environments, and is one of the key contributors to South Africa’s economy. Indeed, almost everything that reaches the consumer has had a road experience, which means that the...

How Cofense simulations defend against corporate phishing

Over the past few years, phishing attacks that target us at work have grown in sophistication and credibility. While they still pop up every now and then, the days of badly written e-mails claiming to be from long-lost uncles with millions of dollars merely needing to...

Managing the risk of procurement fraud

How proactive is your organisation in preventing procurement fraud? What measures are in place to reduce the possibility of incidents within your company and are they effective? These are questions every business should ponder regularly as the risk of procurement...