Cyber risk drives need for closer look at data recovery plans
Neglecting proper data recovery planning is increasing risk for organisations across Africa – particularly small and medium-sized businesses. So says Mark Govender, Senior Systems Engineer at Veeam, who specialises in data recovery and disaster recovery planning and...
In safety-critical industries, real-time communication is a life-saving tool
In South Africa’s most labour-intensive and safety-critical industries – mining, security, and manufacturing – workplace safety is often only as strong as the speed and clarity of communication. In environments where risks escalate in seconds, real-time communication...
AI and scams are driving up insurance risk
Recently a LinkedIn post went viral in which a woman faked her own car accident. She used AI to generate images of her “smashed” car, bruises on her face from her “injuries”, as well as a believable car crash scene and an authentic-looking receipt. The point of the...

Failure to spot financial crime red flags costs businesses billions
Despite efforts to improve compliance, South African businesses remain highly vulnerable to financial crime - with an estimated R182-billion lost annually to money laundering and related illicit activity. This is according to Global Financial Integrity, a US-based...
Empowered people are the real cyber superpower
It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems when you can just...

E-commerce is changing the traditional insurance distribution model
In today's evolving digital economy, a quiet revolution is transforming how consumers access insurance protection and how service providers are enhancing customer experience and revenue streams. By Carl Moodley, CIO of Genric Insurance Company Embedded insurance - the...
How to spot phishing, vishing and smishing
Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...
The strategic advantage of independent Citrix audits
Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments - spanning on-premises, hybrid, and multi-cloud architectures - can lead to configuration drift,...
How working from home affects your insurance
While remote and hybrid work arrangements have recently started to decline as the return-to-office trend has gained momentum around the globe, many companies continue to embrace these models to attract and retain top talent. The working-from-home option does impact...
How to become a threat-resilient organisation
With the continent’s rapid digital transformation, African businesses are being exposed to increasingly complex cyber threats. As their digital footprint grows, so too does the potential for cyberattacks, writes Vinay Hiralall, chief commercial officer of Liquid C2....
What’s the difference between disaster recovery and cyber recovery?
As ransomware attacks become increasingly common, businesses must understand the difference between traditional disaster recovery (DR) and cyber recovery strategies. By Hemant Harie, group chief technology officer at DMP SA While DR centres on restoring IT operations...
Ransomware attack simulation training prepares for real attacks
Businesses today are forced to navigate an increasingly perilous landscape of cyber threats, characterised by the increasing frequency and sophistication of cyberattacks. By Graham Brown, country manager at Commvault The financial repercussions are staggering, with...