
Failure to spot financial crime red flags costs businesses billions
Despite efforts to improve compliance, South African businesses remain highly vulnerable to financial crime - with an estimated R182-billion lost annually to money laundering and related illicit activity. This is according to Global Financial Integrity, a US-based...
Empowered people are the real cyber superpower
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems when you can just...

E-commerce is changing the traditional insurance distribution model
In today's evolving digital economy, a quiet revolution is transforming how consumers access insurance protection and how service providers are enhancing customer experience and revenue streams. By Carl Moodley, CIO of Genric Insurance Company Embedded insurance - the...
How to spot phishing, vishing and smishing
Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...
The strategic advantage of independent Citrix audits
Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments - spanning on-premises, hybrid, and multi-cloud architectures - can lead to configuration drift,...
How working from home affects your insurance
While remote and hybrid work arrangements have recently started to decline as the return-to-office trend has gained momentum around the globe, many companies continue to embrace these models to attract and retain top talent. The working-from-home option does impact...
How to become a threat-resilient organisation
With the continent’s rapid digital transformation, African businesses are being exposed to increasingly complex cyber threats. As their digital footprint grows, so too does the potential for cyberattacks, writes Vinay Hiralall, chief commercial officer of Liquid C2....
What’s the difference between disaster recovery and cyber recovery?
As ransomware attacks become increasingly common, businesses must understand the difference between traditional disaster recovery (DR) and cyber recovery strategies. By Hemant Harie, group chief technology officer at DMP SA While DR centres on restoring IT operations...
Ransomware attack simulation training prepares for real attacks
Businesses today are forced to navigate an increasingly perilous landscape of cyber threats, characterised by the increasing frequency and sophistication of cyberattacks. By Graham Brown, country manager at Commvault The financial repercussions are staggering, with...
Veeam launches strategic framework to close resilience reality gap
In an era marked by escalating cyberattacks and costly IT outages, Veeam Software has unveiled its Data Resilience Maturity Model (DRMM). The new framework helps organisations to objectively assess their true resilience posture and take decisive, strategic action to...
Cyber security best practices for SMEs
As South Africa’s small and medium-sized enterprises (SMEs) increasingly embrace digital tools and platforms, they also face a growing threat: cybercrime. With limited resources compared to larger organisations, SMEs are often seen as soft targets by cybercriminals,...

How effective are employee phishing tests?
Employee phishing tests have gained popularity as a way for organisations to gauge how vulnerable their employees are to phishing attacks and improve their awareness of cybersecurity. However, some have questioned whether it is appropriate to use fear, shame and...