Prepare for more political disturbances and violence ahead
Damages, disturbances and, ultimately, losses from riots, protests, vandalism or other forms of civil unrest are now among the main political risk exposure for companies, with the ongoing impact of the Covid-19 pandemic likely to drive further activity, according to...
How crisis sparks innovation
The novel coronavirus (Covid-19) pandemic has affected every aspect of life and business. But as organisations focus on the immediate impact of the pandemic, they might be taking their eyes off the implications for their intangible assets. During the past several...
Protect against evolving ransomware attack trends
Ransomware attack trends continues to evolve, and the current iterations seen during the Covid-19 pandemic are no exception. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard Labs During this time, malicious actors have...
Malicious employees a major contributor to inside threat cost
The Cost of Insider Threats Report by IBM indicates that the overall damage by negligent or malicious employees totals $11,45-million. Whereas intentional insider criminals cause only 14% of the accidents, their damage adds up to $4,08-million - almost a third of the...
What to watch out for when transacting online
South Africa's online retail industry - though small in comparison to developed international markets - has seen rapid growth over the last 12 months. The Covid-19 pandemic and the subsequent lockdown saw online retail sales soar by approximately 40%. According to...
How 5G could impact automotive IoT and its security
The Internet of Things (IoT) has taken the world by storm, from smart toasters to pet feeders, it seems that each of our everyday appliances is getting upgraded with an embedded computer and an Internet connection. By Nicolò Boatto, security tester at Aon The advent...
Privacy concerns as used electronics are returned to employers
Business owners could be in for a data protection headache as many used electronics that are returned still hold personal information on them. In many cases these devices have information such as credit card details, personal passwords and photos. By Bridgett Vermaak,...
Responsible management is in the hands of the consumer
February is the month of love. While we are spoiling our loved ones with tokens of our love and appreciation, we must remember that this is a time when cyber criminals are spreading their own brand of love by targeting the bank accounts of online shoppers. "The world...
Reduce fraud and risk with advanced analytics
With new banking channels and a younger generation of banked customers continually changing the business landscape for financial services and banks comes the added challenge of new risk profiles. By Clinton Scott, MD of TechSoft International This is not just a data...
Failure to patch and update software causes breaches
ICT professionals, security and governance teams have a duty of care to ensure that the systems people depend on are properly patched and updated, and failure to do so might be seen as a failure of both ethics and internal controls. So says the Institute of...
Cybersecurity threats to the Covid-19 vaccine
We've already seen our fair share of pandemic-driven fraud and cybercrime, but what can we expect as vaccine rollouts pick up pace worldwide? Bu Raymond Pompon, director of F5 Labs Cyber Espionage to Steal Vaccine Data A viable vaccine is valuable intellectual...
Weak protocols could result in VoIP fraud
Telecom fraud, often referred to as phone hacking, is on the rise. According to a global fraud study by the Communications Fraud Control Association, fraud in all its forms cost the telecommunications industry between 3% and 10% of operators' bottom lines. Either way,...