Destroy old hard drives, backup tapes before it’s too late

Old hard drives and backup tapes are a major security threat for any business, they store a massive amount of confidential data that can easily be compromised. Regardless whether the drives or tapes are outdated or inoperable, this data is always accessible and needs...

Why risk managers are interested in flexible working

Risk managers have a new weapon in their arsenals – flexible working. The use of flexible working, and a connected property strategy, as tools for risk management is a relatively new trend, and one expected to grow significantly as more businesses understand the...

Being prepared is key to mitigating cyber attacks

In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring solutions...

Critical data at risk from unauthorised access

Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies, according to security experts. Although in recent attacks customers have not necessarily suffered any financial losses, this could...

Boosting cyber resilience

Barely a week goes by without a story of how another major organisation has been compromised. Whether millions of IDs were stolen, or personal data compromised, it’s clear that no business, irrespective of the money they throw at security solutions, is safe....

The link between compliance and risk

Compliance is a growing challenge. 48 percent of companies saw their regulatory teams grow in 2017 and 75% foresee the need to focus more on managing regulatory risk, according to a Thomson Reuters poll. Financial institutions are spending upwards of $270-billion a...