Banks can reduce fraud with LBS
Location based services (LBS) could offer South African banks opportunities to significantly reduce fraudulent credit card transactions, saving them millions of rands a year and helping them to increase customer loyalty. That’s according to Quentin Joubert, head of...
Managing risk under IP licences
A lot is written about structuring robust intellectual property licensing programmes, whether from the perspective of licensors or licensees of intellectual property rights. This requires a careful consideration of legal, tax and regulatory issues that impact on the...
Proactive surveillance curbs heists
Of the many aspects of cash handling, cash-in-transit has typically been the most difficult to secure. Transportation of luxury goods and cash have always been targets for crime syndicates, and while the frequency of cash-in-transit heists may have reduced in recent...
Avoid the insider threat of data disclosure
The inadvertent disclosure of sensitive data can happen in a flash. Whether it is an employee posting to a micro-blogging site, or carrying documents containing confidential information in plain sight of anyone who walks past, these disclosures can be devastating to...
Protect your Web site and your reputation
Vulnerable Web sites aren’t just a reputation risk – they leave an open door to your backend systems and company data. The days of the enterprise Web site serving as a static “billboard” are long gone. Now, Web sites are a valuable brand ambassador, and crucially,...
Bribery, corruption highlighted in survey
Corporate crime is the scourge of business in South Africa and it’s getting worse. PricewaterhouseCoopers released its annual Global Economic Crime Survey to the media this week, says Jenny Reid MD of iFacts. It exposed the shocking prevalence of economic crime,...
Modern threats need better risk management
With more and more breaches making the headlines, risk management and security professionals are bracing themselves to face not only increasingly sophisticated attacks, but more rigorous scrutiny on their controls and measures. Although each company is different, with...
Becoming a less attractive malware target
The high profile hacks that have flooded the news over the last year have shown that traditional security measures are no longer a match for the complex threats of today. Any business that relies only on antivirus (AV) to secure its systems and endpoints is a sitting...
Avoiding malicious apps
Today, there is an app for virtually everything you can think of, and they’re freely available, from any device that has a Web browser. Not only that, but many of them are free, and are maintained remotely by the developer, removing any hassle from the user. However,...
Keeping home WiFi networks secure
There is more than one type of burglary that can affect a home. The one we are most used to usually involves kicking in the door; the less familiar one involves compromising a computer. And if the intruder in this scenario has compromised a wireless network, users...
Smart ID cards combat fraud, identity theft
Minister of Home Affairs Naledi Pandor announced last week that 100 000 South Africans will have smart ID cards by 31 March. She further announced that another 25 Home Affairs offices have been digitised, in addition to the three used during the smart ID card pilot...
Preventing fraud in the local workplace
Employing the right people doesn’t only make for a productive and healthy company, it also goes a long way in preventing larceny and fraud. Corporate South Africa is becoming more aware of the risks and dangers of corruption often lurking from inside its own ranks....