Use social media intelligence to allay a potential security crisis
In an increasingly digital world, social media platforms are constantly evolving and growing in popularity across the world. In addition to their social and commercial influence, social media also plays a significant role in times of political unrest - particularly in...
Solution House adds crime prediction to Incident Desk
Cape Town-based software and solutions developer Solution House Software has launched a new artificial intelligence (AI) module for Incident Desk designed to predict and map potential crimes before they happen. Solution House Software director, Tiaan Janse van...
Were you ready for Wannacry?
Stroz Friedberg, an Aon company, is a specialised risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected, and regulated business world. His latest blog post shares some invaluable insights on the latest...
Defining your cyber resilience philosophy
Neil Murray, chief technology officer of Mimecast asks what cyber resilience means to you. The answer will surely vary across industries. And, to some, the term might not mean anything at all. In fact, according to new research from Vanson Bourne, not enough...
Time to review critical security controls
Recent incidents have highlighted the need for all companies and organisations to review the safety and security of their data and their IT systems, as standard approaches no longer protect against myriad vulnerabilities, an expert says. "Even the highest judicial...
What is credential stuffing?
Employees who don't take security policies seriously pose a significant threat to corporate systems. Martin Walshaw, senior engineer at F5 Networks explains why. We've all heard about the myriad of security breaches over the past year, resulting in the exposure of...
What does ‘trusted security partner’ really mean?
Information security is rapidly ascending to the top of boardroom agendas, as firms continue to digitise, and as more and more of their value is attributed to their data, writes Paul Jolliffe, DSM expert: security at T-Systems South Africa. It's true: data truly is...
Preventing, managing risk in electronic banking
Banking is a tough industry to be in. Not only do financial institutions carry the burden of managing large amounts of money, they also have to stay on top of constantly changing legislation and the introduction of new technology and customer demands that impact how...
Data the most valuable asset
Cybercrime is expected to cost businesses about R78 trillion by 2021, according to statistics quoted by Cisco Connect South Africa. The internet has created the perfect platform for cyber criminals to grow and prosper as they find ways around security systems and many...
Collaboration key to combat medical aid fraud
Healthcare fraud, waste and abuse are some of the most complex forms of financial fraud to detect, monitor and prevent because the perpetrators are at every level of the delivery chain from healthcare providers at the top to policy holders at the bottom with many...
Businesses use trade credit to secure debtors
With South Africa's current economic and trade environment remaining constrained and unpredictable, businesses are increasingly recognising the benefits of trade credit insurance to protect their bottom line. Trade credit insurance protects a business against the risk...
Data breaches are a part of doing business
Data has become the lifeblood of modern life as everything from room temperatures and health records to banking details and WhatsApp messages are collected and stored. The rapid digital transformation of businesses and services has created an unprecedented amount of...