CFOs must ask critical IT investment questions
Chief financial officers (CFOs) need to take a more active role in the digital transformation of today's companies. With an increase in shadow IT, where departmental staff bring technologies on board without consulting the IT department, the CFO should be asking...
Introducing a fraud-fighting solution
The PWC Global Economic Crime and Fraud survey 2018 South Africa cites that South Africa has the highest level of fraud in the world. PWC's 2018 Fraud Report estimates that R100 billion was lost in revenue due to fraud. In our age of all things digital, high value...
IT has a crucial role to play in the fight against money laundering
The highly publicised debacle of Angelo Agrizzi and six others, who were recently charged with money-laundering and fraud, has brought these issues into the spotlight in South Africa. By Anusha Singh, fraud subject matter expert and business analyst at In2IT The...
The changing face of banking
In the wake of the global economic crisis there has been a significant change in banking economics; preceded by an avalanche of regulation. By Solethu Maku, committee member on the IRMSA Risk Intelligence Committee Although these prudential reforms have resulted in...
Vox unlimited email archiving protects data from disaster
Vox has launched an unlimited email archiving solution to provide organisations with a cost-effective and user-friendly way to protect their email data in the event of a disaster. "It has become far too commonplace for companies to lose email - it is estimated that...
Beware of domain hijacking
Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking, as it is called, entails cyber criminals unlawfully gaining access to a website's unique domain in order to impersonate the business for other illegal...
How to avoid being the next data breach headline
Arcserve Southern Africa cautions local businesses to take a proactive approach to business continuity and data recovery (BCDR) or risk becoming the next data breach headline. "In today's digital world, the issues of data privacy and data security are sources of...
Digital identity question takes centre stage
"On the Internet, nobody knows you're a dog." If you've been around long enough, you've probably run into this famous comic on the net, which sums up the question of digital identity perfectly, writes Lee Naik a tech expert and CEO of TransUnion Africa. Sure, there...
The right information protects from supplier harm
Vetting in the supply chain function enables business to review their suppliers and vendors with the intention of mitigating risk before entering into business relationships. It is an important step in the supply chain, as businesses are vulnerable to a host of...
Cyber Risk 101: What every business needs to know
In our internet-connected society, cybercrime is a very real threat to any business or institution, regardless of size or nature of business that has a network, an internet connection and holds sensitive or personally identifiable data. This is according to Kerry...
There is more to cyber risk than security
Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles, those of business and technology. It's more convenient and seems to simplify the issue. But that is not...
Kaspersky CyberTrace streamlines threat intelligence flows
With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched...