Mitigating employee fraud
Research has shown in excess of 80% of serious frauds committed against an organisation are perpetrated by an employee, either alone or in collusion with other employees, says Deirdre Viljoen, forensics manager in the forensics department at Edward Nathan Sonnenbergs....
No blanket approach to risk management
In an era of increasing risks and the challenges of increasing regulation and legislation and ongoing economic uncertainty, companies need a comprehensive risk management strategy that incorporates data governance. Companies need to combine strategic technology,...
Tight security prevents VoIP toll fraud
Among the last remaining arguments against the tidal wave of voice over IP (VoIP) is the claim that IP systems are susceptible to fraud, says Rob Lith, business development director at Connection Telecom. In reality, breaching VoIP security is a far more complex...
Proactive surveillance lowers theft risk
After a number of security incidents at its office park in Morningside, Sandton, a large international organisation that focuses primarily on engineering and construction market sectors, needed to deploy a remotely managed closed circuit television (CCTV) solution to...
Risk-based billing is the future
“Risk-based billing is set to change the image of the entire IT industry, and the software industry in particular. "The IT giants of the future will be those who can deliver a product according to customer needs and are willing to bet their product delivers, not...
SAP takes aim fraud
To help companies worldwide address the estimated R32,39-trillion worth of fraud that occurs every year, SAP AG has announced the SAP Fraud Management analytic application. Powered by the SAP HANA platform, SAP Fraud Management aims to enable enterprises across...
Risk-based internal auditing best practices
In designing risk-based auditing and monitoring activities, it is important that the internal auditor works closely with the organisation’s senior leadership and the board, or committee of the board, to gain a clear understanding of auditing and monitoring...
QlikView maps fire brigade’s risk
QlikView, a leader in business discovery - user-driven business intelligence (BI) - has announced that the fire brigade Amsterdam-Amstelland has deployed QlikView to map the risks in the region and proactively respond to those risks. QlikView serves as the basis for...
Barnstone launches Mining Crisis Response
The wave of recent violent strikes that has recently hit the South African mining industry demonstrates the need for experienced teams to manage unusual, high-profile and complex events. In response to this need, Barnstone Corporate Services has launched Barnstone...
Firms should count the cost of piracy
The cost of maritime piracy is substantial and can cause significant damage to a company’s bottom line. According to comments recently made by Russian Navy Rear Admiral Vasily Lyashok, Somali pirates have become more flexible, adaptable and better organised and have...
Safety solutions for the connected mine
The global mining industry is characterised by several key trends, including geographical disparity, capital intensive operations, a declining skills base, high levels of safety risk and extreme complexity. In order to help address these unique characteristics,...
Preventing data breaches
Unauthorised access to information is one of the most prevalent cybercrimes in South Africa. Data has become the lifeblood of business – from financial information to the details of a company’s customers, data is the basis of every business transaction today. Unlawful...