Go undercover to manage loss control
Many businesses focus their loss control strategies on preventing unwanted elements from getting in from the outside. While this is certainly an important step in securing assets and minimising risk, what if the truly dangerous element has already made itself...
Downtime not an option for critical infrastructure
THe draft Critical Infrastructure Protection Bill in South Africa, the successor to the National Key Points Act of 1980, has elicited heated debate from several quarters. However, it remains focused on improving security measures in critical infrastructure...
MyCybercare debuts MyID, proactive protection against ID theft
Specialist cyber insurance company MyCybercare has introduced MyID, a solution that offers 24/7 surveillance across the public Net, deep Web and dark Net to prevent private or personal information from being stolen and exploited. MyID provides proactive protection,...
Workplace safety: the good, the bad and the annoying …
What is the first thing that comes to mind when you think of safety in the workplace? If you work in an industrial environment you probably thought of signs, rules and paperwork...lots of paperwork. By Jacob de Coning, senior consultant at JvR Safety. In the service...
Why insurance premiums have shot up
Business owners often grapple with insurance premium increases without realising what leads insurers to hike premiums. This is according to Malesela Maupa, head of insurer relationships at FNB Insurance Brokers, who says understanding some of the common factors that...
FCM Connect adds travel security
FCM'S new technology suite, FCM Connect, gives travellers, bookers and managers critical safety and duty of care support via Secure, a risk management solution customised to each client's requirements. Secure features include itinerary based traveller tracking,...
Transparency, vetting combats procurement fraud
Fraudulent activities within the supply chain are a common risk encountered by private and public sector organisations. While it can be difficult to identify culprits within your own organisation and those within supplier organisations, there are steps that can be...
New mindset needed to address stock losses, fraud
In the absence of a proper risk mitigation plan and loss control blueprint, South African business owners will never really address the critical levels of theft and fraud impacting on our economy. This is according to commercial investigator and international risk...
Ignoring risk is not an option
Few business leaders are oblivious to the proliferation of cyber crime, particularly in light of high profile events such as Petya and WannaCry. But awareness does not always result in action, particularly when budget and skills constraints hamper large-scale...
Reaching today’s CISOs
Information security is top of mind for most businesses today. Not only to they have to worry about increasingly sophisticated and motivated hackers, they have to worry about their own staff, and data loss through either carelessness or malice. Should a security event...
Be proactive against fraud and corruption
Organisations are not immune to the devastating consequences of fraud and corruption. Nowadays, organisations are under threat from a host of risks including procurement fraud and cybercrime. Zaakir Mohamed, director in the dispute resolution practice at Cliffe Dekker...
On World Backup Day, prevent data loss
World Backup Day, celebrated annually on31 March, is a reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes. It is also a good time to pause and reflect on the rising tide of threats that...