Strengthen supplier management processes against fraud
Chief financial officers (CFOs) not only have a serious fiduciary duty to themselves as individuals, but they also have a responsibility to their employer to ensure that every step of every financial process is in order and above board. By Ryan Mer, CEO of eftsure...
Why the board should push cybersecurity boundaries
From a technological perspective, microsegmentation of your IT security environment can be viewed as a way to identify, isolate and curtail the reach of any threat - even once it is in your network. In a cybersecurity context, microsegmentation is a framework that can...
Why the 3-2-1 rule matters for your business data
Bad things happen. One day, that file you worked on is fine. The next, it's gone - lost in a hard drive failure or perhaps a stolen device. Maybe the version you worked on has corrupted, and you need to recover an earlier file. Someone might have deleted the file,...
Is AI a game-changer for anti-money laundering?
In the aftermath of South Africa's recent greylisting by the Financial Action Task Force (FATF), companies are now confronted with the imperative to address eight identified strategic deficiencies while simultaneously reducing their financial crime risk through...
Fortunes to be made in crypto – but threats lie in wait
Many still perceive cryptocurrency as a novel and unconventional form of currency. It operates within an environment that lacks the safety and regulation found in traditional financial systems. Just like the lawless days of the American Wild West, the crypto world is...
How to mitigate rising African cyber incidents
There's no question that African businesses are being increasingly targeted by cyberattacks, with ransomware, spyware and backdoor incidents, as well as data leaks, becoming ever more prevalent. By Brian Smith, business unit manager at Datacentrix One such recent...
Safeguard essential business data against emerging threats
The evolving nature of cyberattacks pose a constant threat to organisations, and staying up-to-date with the latest technology is no longer sufficient to ensure security. By Aslam Tajbhai, solutions architect at DMP South Africa With the emergence of artificial...
Evolving threat landscape makes cyber insurance vital
Cyberattacks on South African companies are on the rise. Local insurers and incident response teams reporting the highest level of incidents they have ever seen, as these attacks become more frequent and sophisticated, the majority of local businesses can expect to...
Efficient data protection and archiving transforms data management
In today's fast-paced digital world, the push for cloud adoption, automation, and intelligent solutions has become the norm for businesses across industries. By Kate Mollett, senior director at Commvault - Africa However, amidst this shift, one crucial aspect that...
Planning for the worst is key to surviving a disaster
Amidst frequent load shedding and often unpredictable stages of power outages, understandably many businesses are concerned about the possibilities of a total blackout. By Duncan van Jaarsveld, client partner for Anglo American at BT Since the beginning of the year,...
Mitigate serious business risks with a data recovery plan
What are the most prominent business risks? The usual suspects are cybercrime, operational interruptions, infrastructure failure, and compliance issues. Yet once we exclude strategic risks such as debt and market shifts, most risks often come down to a single issue:...
Why fraud is regarded as a new language
Fraud has become an alarmingly common occurrence in the world today, with a significant portion of the news involving individuals, organisations and companies engaged in deceptive activities. Gareth Cremen, partner, and Nomcebo Ntuli, candidate legal Practitioner at...