Unlock online security with biometrics

With smartphones increasingly using biometric authentication as a theft deterrent, the potential for such techniques – which rely on the natural, inherent features of a person like their fingerprint, voice or face to confirm their identity – to become the standard in...

Individual integrity and its role in governance

Integrity has no expiry date. You’ve either got it or you haven’t. By Auguste Coetzer and J Michael Judin An honest, diligent company director does not become a crook on the make the moment some arbitrary term limit has been exceeded. This states the obvious. However,...

WhoIs: where are you?

In April 2016, the European Union (EU) Parliament approved the General Data Protection Regulation (GDPR). The GDPR will repeal the existing Data Protection Directive in the EU when it comes into force on 25 May 2018. By Somayya Khan, partner at Adams & Adams...

Build a company culture that identifies risk

By Riaan Bekker – In 1987, a London Underground ticket seller was alerted to a burning tissue on one of the escalators. They duly put it out, but didn’t report the incident. If they had, the slowly-building inferno under the station might have been discovered in...

Does your mobile strategy leave you open to cyber- crime?

By Sanjay Vaid – A report by IDC predicts that there will be over 1,7-billion smartphone users by 2020. When added to other figures supplied by the IDC’s FutureScape: World Mobility 2017 Predictions report, IT spending on mobile is predicted to peak at 50% of...

Professionalised cyber-crime a key business issue

By Mike Rogers – Cyber-criminals had a banner year in 2017, with ransomware variants like WannaCry, Petya and NotPetya bringing major organisations such as National Health Service trusts in the UK, Spain’s Telefonica and the National Bank of Ukraine to their...

Users the biggest cloud security risk

Cloud is coming into its own. Forrester says that public cloud platforms, business services, and applications will reach $236-billion by 2020. With cloud spending predicted to be six times that of IT spending over the same period, a cloud strategy is how companies...

Demand for cyber insurance for business soars

For businesses across the public and private sector, a breach can mean enormous financial losses, catastrophic damage to reputation and customer confidence, as well as embarrassment and legal and regulatory fines.  Simon Campbell-Young, CEO of MyCyberCare, says high...

Cyber intelligence finds the bad guys faster

By Tallen Harmsen – Don’t think the police will help you find, let alone catch, cyber criminals if they make off with your corporate loot. And don’t think this is only a problem for companies in other countries. South African businesses, like South Africans...

Why we are failing at security

By Kathy Gibson – Cyber-threats are coming at us thick and fast, with the potential to cause untold damage, but enterprises are still not aligning their security spend with the threats. “Security is an increasing area of focus for organisations,” says Jon...

VAT and e-commerce: SA falls behind, stays behind

Tax systems around the world are struggling to keep pace with the digitisation of commerce.  Where tax systems could previously rely on technological constraints to protect the fiscus, they must now be adaptive to changes in the e-commerce landscape. By Chetan...

The special needs of seaports

As a major entry point into countries across the world, seaports are one of the most preferred methods for transporting goods and cargo for international trade. By Kamal Mokrani, global vice-president at InfiNet Wireless Clothes, technology, cars and food are often...

Share This