Cryptocurrency kits won’t be insured, Old Mutual Warns
The world of cryptocurrencies or digital currencies is growing rapidly as digitisation continues to disrupt the financial services industry. Mining these cryptocurrencies usually requires expensive computers, servers and other equipment. It is important for people to...
Cyber resilience needs a multi-layered approach to be effective
As organisations increasingly focus on building resilience in the face of a shifting threat landscape, one of the key areas of concentration is the technology environment, including the data stored on the IT systems. Making the cyber environment resilient must be seen...
Are you prepared for the worst case scenario?
Too many organisations take a reactive, rather than a proactive, stance toward incident response, says Simon Campbell-Young, MD of Credence Security. "These days, it's not a question of if a company will be breached, but when. Businesses tend to focus on threat...
Staying ahead of today’s biggest risks
Companies today have a multitude of risks to deal with, and each one requires its own measures of mitigation. However, certain risks remain top of the pile, according to a survey of operational risk practitioners across the globe. The threat of data loss through cyber...
New Aurecon unit to address project failure risk
Aurecon has established a new capital program assurance (CPA) unit to help clients better manage risk, reduce ballooning project costs, and safeguard the value of assets. Independent global analysis indicates that 30 to 60% of projects fail by more than 25% cost...
BYOD and IoT threaten the workplace
The concept of the Internet of Things (IoT) is becoming widely known and understood, not just in business but in the home too. The problem with IoT however is knowing what devices are IoT-enabled and which are not. Opening a huge security risk for businesses as these...
Fraud in IPv4 market calls for extra precautions
Earlier this month, ARIN, American Registry for Internet Numbers, won a critical legal case which set a precedent against IPv4 address fraud. The verdict determined that ARIN was defrauded of approximately 735.000 IPv4 addresses by an individual who used 11 shelf...
3M aims to heighten visual hacking awareness
As corporate South Africa gets to grips with the implications of the Protection of Personal Information Act (PoPIA), 3M has embarked on a campaign to raise awareness about the threat posed by visual hacking. It will be launching Visual Hacking Awareness Week from 21...
Is your business ready for the risks it could face?
Businesses operate in a time of unprecedented volatility across economics, demographics and geopolitics. More than ever companies need to explore new ways to cope with evolving and inter-related complexities in a challenging business environment. Insurance brokerage...
Cyber insurance is a company’s double-layer safety net
The cyber threat landscape has changed so dramatically over the last three years that businesses thato operate in today's digitally connected world need an effective risk management strategy, one that helps them identify and manage their business risks proactively....
Will our votes be protected?
South Africa's eligible voters cast their ballots in national and provincial elections on the 8th of May 2019. Although there are many internal and external factors that may affect the results, a more pressing security concern for the Independent Electoral Commission...
The difference between PAM and PUM
When it comes to breaches, there are many areas that attackers focus on to try and gain entry to a company's data. One that is often overlooked by the security team is privileged accounts. "While many companies manage their privileged accounts and credentials in the...