Work Area Recovery vital to business continuity
With ever increasing climate challenges seen recently with the Western Cape Storms and the devastating Knysna fires, Work Area Recovery (WAR) facilities can become vital to ensure business continuity. Often organisations do not have the capabilities to insource all...
How safe is safe enough?
Senior engineer at F5 Networks, Martin Walshaw, provides tips for end users to avoid falling victim to phishing attacks. Did you know that 56% of all data breaches in 2016 began with a user clicking on a phishing email, giving hackers access to a corporate network?...
Testing drives business continuity, cyber resilience
Most organisations fail to appreciate the importance - and benefits - of testing when it comes to business continuity ... and cyber resilience. At ContinuitySA, client service manager Wayde Anderson says: "We live and breathe testing because we know that the only way...
Does co-location have a bigger part to play in cyber resilience?
Today's digitalised organisations are building resilience into ICT systems as a top priority. However, most organisations still see co-location as part of a disaster recovery plan. With cyber resilience becoming so critical co-location could have a greater role to...
Mimecast, PhishMe collaborate on cyber-resilience
Mimecast has collaborated with PhishMe to integrate its expansive security educational content to help organizations improve employee awareness of common email-borne attacks. Mimecast and PhishMe together provides customers with enhanced cyber resilience against the...
Successful cyber-resilience relies on executive sponsorship
Business is now almost entirely dependent on digital platforms, and cannot function if their ICT systems are impacted or attacked. So, in order to build a resilient business, cyber resilience needs special attention especially from executives. "If the lead does not...
Enterprise risk management for attracting investors
Investors are navigating an economic climate where global communication is perpetuated on a plethora of social media platforms, where consumers have the final say and a brand name can be tarnished in a matter of minutes thanks to the power of citizen journalism and...
Trust and the future of online fraud protection
The recent WannaCry attacks have underlined, underscored and highlighted how absolutely important it is to patch a computer, avoid opening unknown attachments and recognise risk when it arrives in an inbox. And, while there is no connection between the ransomware and...
Integrated asset management, ERP reduces risk for utilities
Africa's energy utilities are under enormous pressure to efficiently meet growing demand for power from businesses and consumers, while managing a range of security, safety, regulatory and environmental concerns. They are being asked to do more with less--to squeeze...
What PoPI means for business risk and compliancy
The Protection of Personal Information (PoPI) Act has been a topic of interest for some time and businesses and the general public alike pondered when it would be in effect, how long it would take to be relevant and who would oversee the process as Information...
Achieve cyber resilience through better cybersecurity
Security should be the enabler of the digital world. The ability to detect, protect, remediate and recover from a cyber threat is critical. Cyber resilience has become an elevated topic of discussion at board level. This has received further attention as a result of...
Enterprise risk management can ease tough economic times
Managing a business is even more demanding when market conditions are harsh or uncertain, and with South Africa having recently experienced a ratings downgrade, times couldn't be tougher for organisations. On the global front we are witnessing the rise of...