Destroy old hard drives, backup tapes before it’s too late
Old hard drives and backup tapes are a major security threat for any business, they store a massive amount of confidential data that can easily be compromised. Regardless whether the drives or tapes are outdated or inoperable, this data is always accessible and needs...
Why risk managers are interested in flexible working
Risk managers have a new weapon in their arsenals - flexible working. The use of flexible working, and a connected property strategy, as tools for risk management is a relatively new trend, and one expected to grow significantly as more businesses understand the new...
Being prepared is key to mitigating cyber attacks
In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring solutions...
Critical data at risk from unauthorised access
Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies, according to security experts. Although in recent attacks customers have not necessarily suffered any financial losses, this could...
Boosting cyber resilience
Barely a week goes by without a story of how another major organisation has been compromised. Whether millions of IDs were stolen, or personal data compromised, it's clear that no business, irrespective of the money they throw at security solutions, is safe. Even more...
The link between compliance and risk
Compliance is a growing challenge. 48 percent of companies saw their regulatory teams grow in 2017 and 75% foresee the need to focus more on managing regulatory risk, according to a Thomson Reuters poll. Financial institutions are spending upwards of $270-billion a...
The hidden risks of investing
The ongoing accounting issues at Steinhoff have again highlighted the need for better governance and risk oversight in the world of investing. By Nigel Morriss, head of Mercer Sentinel and operational risk in Africa, Middle East, India and Turkey for Mercer Wealth,...
Re-evaluate you exposure to IT risk
"Directors: The Steinhoff debacle highlights your exposure to personal liability" - this was the warning trumpeted in the headline to a recent BGR Pyper Turner newsletter article. by Escrow Europe MD Andrew Stekhoven The article referred to the 'new' Companies Act of...
SA businesses reluctant to insure against cyber-attacks
South African companies have suffered several cyber-crime incidents over the past few years, yet local businesses are still reluctant to insure against this risk. Roy Wright, head of risk solutions at financial advisory group GTC, believes there are two primary...
Integrate business continuity and cyber resilience
Business's increasing dependence on digital platforms and data has generated significant efficiencies - but has also spawned a well-resourced cyber-crime industry. It is thus imperative that cyber resilience is integrated into organisations' business continuity...
Manage the culture of risk
Riaan Bekker, force solutions manager at thryve, examines the world of risk software. A friend of mine is a keen cyclist. He had a trusty bicycle that carried him around, especially when taking the kids out over weekends. And that was all fine: why replace what works...
Debtsource debuts for credit risk
Credit management specialist Debtsource has launched a solution to assess, insure, finance and manage trade credit risk. Through a collaboration with Alternative Finance Solutions (AFS), Debtsource clients can now assess their initial credit risk through detailed...