Executives need to protect themselves against social media scammers
With the rise of social media scams globally, business executives find themselves increasingly targeted by cybercriminals seeking to exploit their personal and professional lives. WhatsApp, Facebook, and Instagram have become prime platforms for scammers to lure...
Hacking and your business: not if, but when
South Africa is experiencing a massive surge in internet crime. A shocking 78% of South African organisations were struck by a ransomware attack last year, up from 51% the previous year. And, according to INTERPOL's 2022 Africa Cyberthreat Assessment report, South...
Insurance coverage for global events
Events such as the Covid pandemic and rising levels of cybercrime are encouraging insurers to revisit their policy wording to exclude certain events, write Sandra Sithole, partner, and Dr Ninakhulu Ntsanwisi, associate from Webber Wentzel. Over the past three years,...
Healthy suspicion can stop phishing attacks
Your shipment is waiting, but it needs your approval. Your subscription payment has failed, but your loyalty qualifies you for three free months. Payment is due on this account - please use these bank details. If you are tired of receiving these (unsolicited)...
What security monitoring can tell you about your business
Security monitoring technology continuously logs and analyses data from network points and nodes, enabling security teams to detect and respond to incidents faster and, while this is crucial, it's not the full extent of its usefulness. By offering continuous...
Innovation, competition fueling disruption in trade credit insurance
South Africa's trade credit insurance offerings have largely retained their European roots making them less than ideal for the local market, says Gareth Joubert, MD at Hollard Trade Credit. "We have a matured trade credit insurance market, but the product is still on...
African organisations must adopt an active defence posture
Considering the constantly evolving and increasingly sophisticated cyber threat landscape, the state of cybersecurity, resilience and data protection in Africa potentially has global implications. By Kate Mollett, regional director of South Africa and SADC at...
Email best practices under the spotlight
Just about every organisation in the world relies on email. And yet, securing this mission-critical platform is often not treated with the diligence that is required. One of the best ways to mitigate against the threat of compromise is a combination of user education,...
Understand and navigate AI risks
The risks associated with using artificial intelligence (AI) systems can be extensive and have severe business impact if left unaddressed. By Nevellan Moodley, head of financial services technology at BDO South Africa AI is being used everywhere, across every business...
Strengthen supplier management processes against fraud
Chief financial officers (CFOs) not only have a serious fiduciary duty to themselves as individuals, but they also have a responsibility to their employer to ensure that every step of every financial process is in order and above board. By Ryan Mer, CEO of eftsure...
Why the board should push cybersecurity boundaries
From a technological perspective, microsegmentation of your IT security environment can be viewed as a way to identify, isolate and curtail the reach of any threat - even once it is in your network. In a cybersecurity context, microsegmentation is a framework that can...
Why the 3-2-1 rule matters for your business data
Bad things happen. One day, that file you worked on is fine. The next, it's gone - lost in a hard drive failure or perhaps a stolen device. Maybe the version you worked on has corrupted, and you need to recover an earlier file. Someone might have deleted the file,...