SA networks need to defend against SIM swap fraud
Mobile networks must not be complacent about SIM swap fraud and they need to prioritise the protection of customers. This is according to Gur Geva, founder and CEO of iiDentifii, who adds: "Although SABRIC has noted a slight decline in reported SIM swap fraud in its...
Joburg building fires highlight need for proactive safety planning
The most recent incident of a fire breaking out in the Johannesburg central business district (CBD) on 3 February highlights the importance of the rational design of performance-based fire-safety systems for residential buildings in particular. This is word from ASP...
Advanced and persistent threats to define the digital security landscape
If 2023 was marked by cybercriminals' remarkable adaptability and relentless pursuit of new avenues to achieve their goals - be it through exploiting vulnerabilities, gaining unauthorised access, compromising sensitive information, or defrauding individuals - the year...
Geospatial data helps manage natural hazards, climate change threats
Mitigating the increasing effects of climate change has become a top priority for South African insurers who have collectively paid billions of rands in related damages over the past five to 10 years. By Zelda Els, technical specialist at Santam The increasing...
Software escrow could give SA fintech developers an edge
In large corporations, digital transformation is impacting every customer touchpoint, yet this rapid innovation for operational advancement could be what exposes them to operational risk. The uptake of bespoke third-party software solutions is essential to enable...
How SMEs can set their defences against today’s cyber threats
What is the most dangerous trait of a cyberattack? Some use complex social manipulation to spear phish individuals. Others deploy weaponised artificial intelligence (AI) and sophisticated malware programmes to gain access and create chaos. By Hans-Peter Bauer, senior...
Are you covered for Email interception fraud?
Email interception fraud is on the rise and takes the form of criminals stealing information such as email usernames and passwords. It enables the fraudster to gain access to your business email accounts allowing them to impersonate you and the business. It provides...
Insurance companies weather the storm with threat alerts
Customers only engage with insurance companies during the claims process when something has been damaged - whether a home, a vehicle, or a business. And that's where weather intelligence can improve and enhance the customer experience, while saving insurance companies...
Never do these things on your company computer
At least 70% of employees admit to doing activities that are not work-related on their company computer. Although some employers may ignore your browsing habits, it is important to reconsider your activities on your work PC or laptop, particularly in light of...
Automation key to efficiency, risk mitigation, cost reduction in data management
Data management has become increasingly crucial in Africa, with the volume and significance of data growing at an unprecedented rate. By Kate Mollett, regional director at Commvault Africa As a result, the cost of handling and protecting this enormous volume of data...
What is data encryption?
Keeping information from unauthorised eyes is a practice as old as recording information. Regents would add their seal into wax to stop snoops from reading orders. Warring nations spend great expense and effort to break the codes of their opponents. And in the modern...
Cyber insurance won’t get your stolen data back
With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high. As a result, many businesses have explored the option of cyber insurance in an effort to mitigate the risk. By Simeon Tassev, MD and QSA...