A risk-based approach to procurement
The impact of fraud in procurement can be far reaching with many aspects of the business affected by such transactions. With the threat of reputational damage, legal non-compliance and potential financial losses remaining a possibility, it is critical that...
Data allowed to go dark is a risk and missed opportunity
Increased data growth, coupled with the need to benefit from the existing data opportunity consistently positions data at the core of all business operations today. But within the data hype, are businesses too consumed with either storing all data for 'just in case'...
Are you prepared for multinational risks?
In recent years, many more organisations have established business continuity management programmes (BCPs) which define the different processes (suggestion to utilise the wording of 'process' rather than 'system' due to general, but not always, confusion around BCP...
Everyone should think like a hacker
Relevant cybersecurity isn't perpetuated exclusively through investment and systems, it is reliant on people and their understanding of the cyber threat. A leading ethical technology hacker in Europe, Jamie Woodruff, gained access to a well-known financial institution...
Successfully managing risk in a digital world
At a time when IT staff need to deliver on the backup, recovery, and business continuity needs of organisations, decision-makers must be able to successfully manage risk. By Kate Mollett, regional manager for Africa at Veeam In South Africa, the recent launch of...
Identity and access management has business on high alert
Identity and access management (IAM) is now a must in commerce and the need to protect digital assets (most notably data) is driving the development of solutions and widespread adoption, irrespective of the size of the business. Paul Chari, principal consultant EDC...
Productivity, innovation in manufacturing calls for better risk management
With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is an industry that is highly vulnerable to cyber attacks. Yet, the manufacturing industry remains fragmented in its approach to managing...
Where do cloud risks lie?
Cloud services have heralded a new era in IT. Their benefits are numerous, accelerating business through their ability to quickly scale, allow organisations to be agile with their resources, and provide new opportunities for collaboration. Tumelo Mashego, business...
Building the security baseline
At any given moment, a cybercrime victim is losing around R3.5 million a day, according to Action Fraud in the UK. The Cyber Security Breaches Survey 2019 found that 60% of medium firms and 61% of large firms deny that they have been attacked and yet 25% of those that...
Cybercrime in the South African legal fraternity
Hack attacks, ransom threats and theft of money through fraudulent transactions are all becoming a stark reality for legal professionals and law firms around the world. According to the South African Banking Risk Information Centre (SABRIC), South Africa currently has...
Failure to innovate could spell the end
The overall risk readiness for the Top 10 risks identified in Aon's 2019 Global Risk Management survey has dropped from 53% in 2017 to 51% in 2019. Failure to innovate and meet customer needs is one of the top 10risks, at number nine, with participants in the survey...
What to do if your identity has been stolen
Finding purchases or transactions on your bank statements that you can’t explain? Receiving credit cards or statements for accounts that you never applied for? Denied credit for a purchase, even though your credit record is clear? Chances are that you’ve become one of...