
SIM box fraud a growing threat
South Africa’s communications systems are facing a growing threat that can no longer be ignored. As the country becomes more connected, with over 44-million people now online, the infrastructure that underpins our digital lives is increasingly being targeted by...
Protecting our youth in a technological age
Given the speed at which the digital economy, technological and AI landscape is developing, young people need to be educated on how to mitigate the associated risks with a combination of cyber insurance and risk management practices. This is an important part of...
Legal risks in AI-driven customer service, inventory management, back-office support
The use of artificial intelligence (AI) in retail continues to generate discussion. This is largely due to the benefits that retailers have realised by using the technology across various parts of the business value chain. By Wendy Tembedza, partner at Webber Wentzel...
Cyber risk drives need for closer look at data recovery plans
Neglecting proper data recovery planning is increasing risk for organisations across Africa – particularly small and medium-sized businesses. So says Mark Govender, Senior Systems Engineer at Veeam, who specialises in data recovery and disaster recovery planning and...
In safety-critical industries, real-time communication is a life-saving tool
In South Africa’s most labour-intensive and safety-critical industries – mining, security, and manufacturing – workplace safety is often only as strong as the speed and clarity of communication. In environments where risks escalate in seconds, real-time communication...
AI and scams are driving up insurance risk
Recently a LinkedIn post went viral in which a woman faked her own car accident. She used AI to generate images of her “smashed” car, bruises on her face from her “injuries”, as well as a believable car crash scene and an authentic-looking receipt. The point of the...

Failure to spot financial crime red flags costs businesses billions
Despite efforts to improve compliance, South African businesses remain highly vulnerable to financial crime - with an estimated R182-billion lost annually to money laundering and related illicit activity. This is according to Global Financial Integrity, a US-based...
Empowered people are the real cyber superpower
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems when you can just...

E-commerce is changing the traditional insurance distribution model
In today's evolving digital economy, a quiet revolution is transforming how consumers access insurance protection and how service providers are enhancing customer experience and revenue streams. By Carl Moodley, CIO of Genric Insurance Company Embedded insurance - the...
How to spot phishing, vishing and smishing
Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...
The strategic advantage of independent Citrix audits
Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments - spanning on-premises, hybrid, and multi-cloud architectures - can lead to configuration drift,...
How working from home affects your insurance
While remote and hybrid work arrangements have recently started to decline as the return-to-office trend has gained momentum around the globe, many companies continue to embrace these models to attract and retain top talent. The working-from-home option does impact...