Get the nuts and bolts in place to stop data loss
Sensitive business information, customer details, financials, transactions and product information, all forms part of important data in organisations and is the lifeblood of every business. But, how much control do businesses have over their data, do they know where...
How to stay ahead of data breaches in a hyper-available world
Security breaches are an ongoing threat in the digital landscape. The impact they pose on a data-driven business can be catastrophic. Being able to access sensitive personal or corporate data, compromise it, and take parts of your business offline while it is held to...
SMEs need cyber insurance too
It's too easy for small to medium-sized enterprises (SMEs) to dismiss cyber crime, because they view themselves as too small to be attractive targets for criminals. However, this is not the case. Simon Campbell-Young, CEO of MyCybercare, says that in reality, all...
What driverless cars mean for innovation and risk
It's coming quickly down the road: a world where we can get in a car anytime we want to but don't own one. Where we're all passengers. Where accidents are drastically reduced, and we don't have to worry about dangerous drivers on the road. Where we can join conference...
Ransomware attackers get targeted
During 2017, the WannaCry ransomware attack impacted more than 300 000 people across 150 countries in less than two days. In 2018, criminals are evolving their tactics, including launching well-researched, targeted attacks intended to infect specific, high-value...
Why your business needs cyber insurance
While still in its infancy, cyber insurance has been on offer for some time, and is seeing a soaring demand around the world. However, the uptake of cyber insurance in South Africa is still alarmingly low. Simon Campbell-Young, CEO of MyCybercare, says that local...
Destroy old hard drives, backup tapes before it’s too late
Old hard drives and backup tapes are a major security threat for any business, they store a massive amount of confidential data that can easily be compromised. Regardless whether the drives or tapes are outdated or inoperable, this data is always accessible and needs...
Why risk managers are interested in flexible working
Risk managers have a new weapon in their arsenals - flexible working. The use of flexible working, and a connected property strategy, as tools for risk management is a relatively new trend, and one expected to grow significantly as more businesses understand the new...
Being prepared is key to mitigating cyber attacks
In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring solutions...
Critical data at risk from unauthorised access
Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies, according to security experts. Although in recent attacks customers have not necessarily suffered any financial losses, this could...
Boosting cyber resilience
Barely a week goes by without a story of how another major organisation has been compromised. Whether millions of IDs were stolen, or personal data compromised, it's clear that no business, irrespective of the money they throw at security solutions, is safe. Even more...
The link between compliance and risk
Compliance is a growing challenge. 48 percent of companies saw their regulatory teams grow in 2017 and 75% foresee the need to focus more on managing regulatory risk, according to a Thomson Reuters poll. Financial institutions are spending upwards of $270-billion a...