Fraud in IPv4 market calls for extra precautions
Earlier this month, ARIN, American Registry for Internet Numbers, won a critical legal case which set a precedent against IPv4 address fraud. The verdict determined that ARIN was defrauded of approximately 735.000 IPv4 addresses by an individual who used 11 shelf...
3M aims to heighten visual hacking awareness
As corporate South Africa gets to grips with the implications of the Protection of Personal Information Act (PoPIA), 3M has embarked on a campaign to raise awareness about the threat posed by visual hacking. It will be launching Visual Hacking Awareness Week from 21...
Is your business ready for the risks it could face?
Businesses operate in a time of unprecedented volatility across economics, demographics and geopolitics. More than ever companies need to explore new ways to cope with evolving and inter-related complexities in a challenging business environment. Insurance brokerage...
Cyber insurance is a company’s double-layer safety net
The cyber threat landscape has changed so dramatically over the last three years that businesses thato operate in today's digitally connected world need an effective risk management strategy, one that helps them identify and manage their business risks proactively....
Will our votes be protected?
South Africa's eligible voters cast their ballots in national and provincial elections on the 8th of May 2019. Although there are many internal and external factors that may affect the results, a more pressing security concern for the Independent Electoral Commission...
The difference between PAM and PUM
When it comes to breaches, there are many areas that attackers focus on to try and gain entry to a company's data. One that is often overlooked by the security team is privileged accounts. "While many companies manage their privileged accounts and credentials in the...
CFOs must ask critical IT investment questions
Chief financial officers (CFOs) need to take a more active role in the digital transformation of today's companies. With an increase in shadow IT, where departmental staff bring technologies on board without consulting the IT department, the CFO should be asking...
Introducing a fraud-fighting solution
The PWC Global Economic Crime and Fraud survey 2018 South Africa cites that South Africa has the highest level of fraud in the world. PWC's 2018 Fraud Report estimates that R100 billion was lost in revenue due to fraud. In our age of all things digital, high value...
IT has a crucial role to play in the fight against money laundering
The highly publicised debacle of Angelo Agrizzi and six others, who were recently charged with money-laundering and fraud, has brought these issues into the spotlight in South Africa. By Anusha Singh, fraud subject matter expert and business analyst at In2IT The...
The changing face of banking
In the wake of the global economic crisis there has been a significant change in banking economics; preceded by an avalanche of regulation. By Solethu Maku, committee member on the IRMSA Risk Intelligence Committee Although these prudential reforms have resulted in...
Vox unlimited email archiving protects data from disaster
Vox has launched an unlimited email archiving solution to provide organisations with a cost-effective and user-friendly way to protect their email data in the event of a disaster. "It has become far too commonplace for companies to lose email - it is estimated that...
Beware of domain hijacking
Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking, as it is called, entails cyber criminals unlawfully gaining access to a website's unique domain in order to impersonate the business for other illegal...