FirstRand prioritises model risk management
FirstRand needed to gain a single view of model risk across various franchises, segments and geographies, while meeting compliance obligations.Using SAS Model Risk Management it was able to get a full inventory of credit models, gain an epectation to meet all...
Creating effective cybercrime training
Recent statistics released by Vanson Bourne and Mimecast show that less than half of South African companies are completely confident with the staff training they currently have in place to counter email cyber-attacks. As many as 46% only have some confidence and 6%...
Strengthen your security position
The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology. The Internet of Things (IoT) adds...
Cyber insurance and availability make good bedfellows
With attacks like WannaCry and Petya infecting hundreds of thousands of computers worldwide, many are calling this the Year of Ransomware. Its increased level of threat sophistication and maturity clearly show that even though traditional methods of data protection...
King Price launches cyber-insurance
Most people know whether they have insurance for their stuff, car accidents and theft, and liability, but do they know if they're covered for cybercrime? Cybercrime is real, and it's on the increase. In South Africa, 84% of adults who're online have already been...
Availability in the age of security risk
With ransomware attacks becoming increasingly prevalent, companies are more aware than ever for the need for effective cybersecurity measures. But despite this, not enough is being done to ensure the availability of data in the event of systems being compromised,...
The case for cyber insurance
South Africa has not come through recent cyber-attacks unscathed. When cyber criminals breach a network, it's done with the malicious intent of gathering data: medical records, personal information, ID numbers and account details. The propensity and magnitude of...
Tips for selling to CISOs
Selling cyber security products and services is challenging at the best of times. Security, even though it is understood to be essential, tends to be a grudge purchase for most businesses. "Security is aimed at preventing a business from falling victim to a breach or...
BDO advises risk assessment
In a new white paper published today, BDO's global cybersecurity leadership group stresses the importance of businesses gaining an understanding of their unique risk profiles in order to ensure the right cyber insurance for their needs. Cyber insurance: managing the...
Hacking humans
The easiest way to hack into a network is by exploiting the one vulnerability most often left unpatched -- human nature, according to Michael Ferendinos, enterprise risk business unit head at Aon South Africa and Rudi Dicks, senior cyber consultant at BDO Forensics...
The risks of allowing smartphones at the bank …
Employees aren't just bringing their devices into work -- they're living on them. Checking one's phone is the first and last thing many do every day. With smartphones becoming constant companions, hackers are seeking every avenue available to break into them. The...
Ransomware sees global, local growth
Global ransomware attacks have increased by 11% over the past 12 months ending March 2017, according to Europol. Furthermore, a recent IBM Security and Ponemon Institute study found that the average cost of a data breach in South Africa is currently R32-million, a 12%...