Saicom Voice Services adds data management
Saicom Voice Services has added a data management solution to its evolving product stack, driven it says, by customer demand for services that are customisable to local business requirements and realities. "Our clients have come to rely on us for customisable...
Resistance to change the biggest reason for failure
People are resistant to change and this is the main reason why cloud migrations tend to fail. Business leaders must ensure their cloud strategy is aligned with their business goals, a lack of vision from management and staff will have an enormous effect on the success...
Lessons on the future of grid security
Cybercrime is evolving - as are its targets. While information theft remains the most expensive and fastest-rising consequence of cybercrime, core systems, such as industrial control systems are also being targeted - with increasing frequency. By Wandile Mcanyana,...
Cyber risk the Achilles heel for SMEs
Many small and medium businesses assume that they are not likely targets for a cyberattack, believing that only large corporates, banks and government institutions appeal to cyber criminals. As a result, their security measures are typically nowhere near the levels...
Governing the digital nomads of the future
The Fourth Industrial Revolution brings with it a fundamental shift in how we do business, writes Jessica Knight, IRMSA risk intelligence committee member. Advances in technology and the increasing digitisation of many roles means that the conventional...
Fujitsu develops AI disaster mitigation technology
Fujitsu Limited and Fujitsu Laboratories today announced the development of a technology that draws on mathematical models built with limited data on rainfall and water levels to create flooding predictions for rivers. The solution leverages Fujitsu Human Centric AI...
A risk-based approach to procurement
The impact of fraud in procurement can be far reaching with many aspects of the business affected by such transactions. With the threat of reputational damage, legal non-compliance and potential financial losses remaining a possibility, it is critical that...
Data allowed to go dark is a risk and missed opportunity
Increased data growth, coupled with the need to benefit from the existing data opportunity consistently positions data at the core of all business operations today. But within the data hype, are businesses too consumed with either storing all data for 'just in case'...
Are you prepared for multinational risks?
In recent years, many more organisations have established business continuity management programmes (BCPs) which define the different processes (suggestion to utilise the wording of 'process' rather than 'system' due to general, but not always, confusion around BCP...
Everyone should think like a hacker
Relevant cybersecurity isn't perpetuated exclusively through investment and systems, it is reliant on people and their understanding of the cyber threat. A leading ethical technology hacker in Europe, Jamie Woodruff, gained access to a well-known financial institution...
Successfully managing risk in a digital world
At a time when IT staff need to deliver on the backup, recovery, and business continuity needs of organisations, decision-makers must be able to successfully manage risk. By Kate Mollett, regional manager for Africa at Veeam In South Africa, the recent launch of...
Identity and access management has business on high alert
Identity and access management (IAM) is now a must in commerce and the need to protect digital assets (most notably data) is driving the development of solutions and widespread adoption, irrespective of the size of the business. Paul Chari, principal consultant EDC...