How much protection does cyber insurance give businesses?
As the industry adjusts to increasing levels of cybercrime, insurers are increasing premiums and becoming more strict about whom they will insure. By Dave Russell, vice-president: enterprise strategy at Veeam However, if organisations don't meet even the minimum...
Transforming into a cyber resilient organisation
The premise behind Zero Trust is well-documented. Corporate networks should never blindly trust any device or user. By Ralph Berndt, sales and marketing director at Syrex Instead, the focus is on verifying and authenticating each interaction and communication before...
Active threat hunting a non-negotiable for the modern business
With South Africa being a favoured target for cyber attackers globally, and with the threats growing in both volume and sophistication, local organisations must do more to mitigate against these attacks. By Richard Frost, product head: cybersecurity at Armata In...
How to ensure data in the cloud is stored safely
Passwords have been the last line of defence for digital accounts and applications for some time, but recent password manager breaches indicate that even this long-trusted method of securing accounts is vulnerable. With user credentials selling at a premium on the...
Data privacy and protection priorities in 2023
World Privacy Day, observed annually on 28 January, serves as a reminder of the importance of protecting personal data in today's digital age. By Kate Mollett, regional director of Commvault Africa Data privacy also provides individuals with control over how their...
Fraud trends every CFO should know
PwC's Global Economic Crime and Fraud Survey 2022 revealed that 46% of organisations have experienced fraud, corruption, or other economic crimes in the last 24 months. Ryan Mer, CEO of eftsure Africa, gives a rundown of what to look out for. Fraud protection is no...
The importance of accelerated underwriting
The adoption of accelerated, or automated underwriting, which uses advanced artificial intelligence and machine learning technologies to evaluate risk and underwrite life insurance, has been limited to date. By Patrick Ashton, UK operations at Alula Insurance...
Avoid BEC attacks with good email hygiene
Business email compromise (BEC), where criminals steal money by simply 'asking for it', is on the rise. According to an Interpol report, BEC is one of the top five digital threats in Africa - and South Africa is the most likely target, shouldering 34% of the...
Best practices for cyber incident readiness
t is time to say goodbye to the incident response plans of “cyber past” and welcome a new approach. This is the word from Spiros Fatouros, Marsh Africa CEO, who says: “Incident response planning is one of the 12-cybersecurity controls that most cyber insurers ask...
Identity theft puts South Africans at risk
Identity theft in South Africa continues to rise, despite numerous warnings and efforts to protect consumers. Reports suggest that someone's identity is stolen somewhere in the world every two seconds. Recent statistics from the National Council on Identity Theft...
Put safety first over the festive season
The end-of-year period has earned itself a notorious reputation as the 'silly season' - and for good reason. Insurance claim data is indicative of a trend that sees a noticeable upsurge in motor vehicle accidents and home burglaries over the festive season. For South...
Simple data protection tips could save millions
South Africa has in recent times become a playground for cybercriminal activities, with syndicates targeting South Africans, companies, and organisations, stealing personal data by hacking into computer systems and causing data breaches. This poses a threat to the...