What the CrowdStrike outage has taught us
In today’s always-on cloud-driven technology environment, companies – and their customers – expect their IT services to run constantly. While no system is completely error-free, any outages or downtime should be measured in seconds, or minutes at the most. By Richard...
Cyber insurance a risk management tool for financial resilience
As more businesses transform digitally, more cybercriminals are exploiting vulnerabilities. Fortunately, businesses do have a shield to protect them through cyber insurance. By Brett Marais, head of cyber solutions and managed security services, and Veronica Lukwago,...

Software key to improved disaster management
Over the past few months, South Africa has experienced numerous disasters, both manmade and natural. From the George building collapse in May to the floods that have wreaked havoc in the Western Cape for the second year in a row, and the wildfires that engulfed...

Are you handling the mobile device risk effectively?
Since the pandemic, companies have become a lot more open to individuals using their personal devices for business purposes. By Nemanja Krstić, operations manager: managed security services at Galix However, this introduces an additional layer of complexity and risk...
How can world leaders bolster resilience in an insecure world
It is no exaggeration to say that governments play an absolutely pivotal role in delivering effective cybersecurity. From regulation to investment, national leaders establish priorities, set goals and determine the urgency of our collective efforts across an...

How cyber risks have become business risks
Cyber risk is business risk. Anything that threatens IT threatens the company, writes Alain Sanchez, EMEA CISO at Fortinet. We have become extremely dependent upon our digital assets. As a result, business leaders need to realise the magnitude of the change. The...

SA businesses should get proactive about network security
Digital transformation can result in companies' IT infrastructure becoming more expensive and complex, as business digitalisation encompasses all departments, functions, users and endpoints. By Gert Janzen, product manager at Seacom This puts pressure on enterprises'...
Partially occupied offices a risk for business owners
While several large companies have spearheaded a gradual return-to-work, the hybrid working model has remained sticky for many South Africans. The latest BrandMapp survey indicates that as of 2023, 54% of "mid-market-and-up" South Africans are either following the...
Malicious apps a hidden danger in your pocket
Cybercriminals are unleashing a fresh wave of malicious apps designed to steal your most sensitive information - and they're getting smarter by the day. "The landscape of mobile security is changing rapidly," warns William Petherbridge, manager of systems engineering...
These cybercrime trends have put local insurers on high-alert
These are times of unprecedented change and disruption. New technological innovations and geopolitical events are just two of the major catalysts of change in the landscape of risk. In times of volatility, businesses are often faced with increased risk exposure, with...

Mimecast debuts Human Risk Management platform
Mimecast has launched its Human Risk Management (HRM) platform, in response to customer and market demand for a more effective means of mitigating risk brought on by employee mistakes and user errors. The platform will provide visibility into an organisation's risk...
Standardisation helps to bullet-proof OT security
South Africa is not being spared the scourge of cyberattacks on operational technology (OT) networks. As recently as 22 June, the National Health Laboratory Service was hit by a ransomware attack that blocked communications between its information systems, resulting...