Tackle procurement fraud with vetting
Procurement fraud is a leading commercial risk and organisations must implement every possible preventative measure to ensure it does not impact the business. Described loosely, procurement fraud includes the acts of "dishonestly obtaining an advantage, avoiding an...
Keep your personal information safe
The ever-growing use of social media and mobile devices by everyone has opened easy gateways for cybercriminals to steal personal information, identities, and money. Individuals are making it even easier for them by sharing too much online. This is according to Charl...
Effective ways to thwart mobile fraudster
As the global economy continues its lacklustre performance, legitimate and illegitimate businesses alike are under pressure to boost revenues. "South Africa can expect renewed unauthorised micro-billing attacks on its mobile users as overseas-based fraudsters look to...
Protect customers from identity theft and data breaches
Identity theft and data breaches are on the rise with Fraudscape stating in its 2019 report that identity theft hit an all-time high of more than 174 000 cases in 2017 in the UK alone. By Simon Murrell, head of development and executive director at BrandQuantum...
MiX Telematics launches in-cab upgrade
MiX Telematics has announced an upgrade to its MiX Vision solution. MiX Vision integrates seamlessly with existing flagship products and delivers driver- and road-facing cameras for fleet managers to conveniently obtain an accurate view of their fleet operations. The...
MTN urges customers to protect against fraud
As the festive season approaches, fraud incidences will increase as scammers continue to find new ways to circumvent security barriers and scam unsuspecting consumers of their hard-earned money. "October is Fraud Awareness Month, and we'd like to take the opportunity...
Manage the risk of downtime in mines
Unplanned downtime in a critical environment such as a mine, can result in a catastrophic event that impacts the safety of workers and the environment on a massive scale. Brendan Hall, sales manager: Africa at Axis Communications Production losses can spiral out of...
Beware of company data on private devices
Few businesses realise that the data residing on personal devices could result in a data breach. They also don't understand that it's possible to recover the data from damaged hard drives, broken phones, credit card machines and even memory cards. Xperien CEO Wale...
Does your backup defend against ransomware?
So far this year, 4,1-billion private records have been exposed as a result of breaches and cyber attacks. From WhatsApp, to Capital One, to utilities, to city and state governments all over the world, organisations with multi-million dollar security budgets have...
Can your company’s reputation be redeemed post-scandal?
The destructive power of a corruption incident cannot be understated. The Steinhoff scandal of 2019 and the ongoing state capture enquiry are cautionary tales of how costly unethical behaviour can be. When an organisation's trustworthiness comes under intense...
Protect yourself against cyberattacks
Consistent year-on-year growth of Internet users is resulting in increased digital identities and the sharing of more and more personal information online. As Internet users become more comfortable and interconnected with the digital tools available to them - tools...
Used drives on eBay still contain sensitive personal data
Xperien has warned that 42% of hard drives purchased on eBay still contain sensitive data and 15% hold personal information on them, from financial records to birth certificates, passport numbers and photos. This is according to a study from Ontrack and the Blancco...