Data breach shines spotlight on PoPI

The recent cyber-attack and holding hostage of a South African insurance provider’s IT infrastructure has drawn attention to the dire need for effective protection of consumer data. While the company asserts that no financial losses have been encountered by any of its...

Labour law changes and their effect on business

Our labour laws are constantly evolving as the South African government seeks to balance stronger protections for employees with the need to create a business-friendly investment climate. By Rob Cooper, tax expert and director of legislation at Sage We can expect to...

Protect your business against cybercrime

In the wake of last year’s surge of debilitating ransomware attacks, many businesses are investing heavily in cybersecurity technology, with Gartner predicting that worldwide security spending will reach unprecedented highs at an estimated $96-billion this year alone....

Jasco rolls out own biometric solution

Jasco has installed an access control solution from its own security portfolio, the Touchless Biometric (TBS) Access Control System, at its head office in Midrand. The system was deployed in under two months (including enrolling all employees and biometrics on a...

GDPR is coming: comply or die …

On 25 May this year, a new piece of legislation comes into effect in Europe that could have severe consequences for non-compliant South African businesses. by Tracy Bolton, director: general business at SAP Africa The General Data Protection Regulation – or GDPR for...

Expats must go beyond understanding new law

South African expatriates need not only understand the new expatriate tax law, but also act on it or face dire tax consequences. By Jonty Leon, attorney and financial emigration legal manager The amendment to the South African Income Tax Act No. 58 of 1962 has been...

Change of mindset needed for security

Looking back on 2017 gives some clues to the security realities we must face in 2018 and beyond. At the same time, though, companies must start confronting disturbing new trends, say Jeremy Capell, executive: cyber resilience at Internet Solutions and ContinuitySA and...

Unlock online security with biometrics

With smartphones increasingly using biometric authentication as a theft deterrent, the potential for such techniques – which rely on the natural, inherent features of a person like their fingerprint, voice or face to confirm their identity – to become the standard in...

Individual integrity and its role in governance

Integrity has no expiry date. You’ve either got it or you haven’t. By Auguste Coetzer and J Michael Judin An honest, diligent company director does not become a crook on the make the moment some arbitrary term limit has been exceeded. This states the obvious. However,...

WhoIs: where are you?

In April 2016, the European Union (EU) Parliament approved the General Data Protection Regulation (GDPR). The GDPR will repeal the existing Data Protection Directive in the EU when it comes into force on 25 May 2018. By Somayya Khan, partner at Adams & Adams...

Build a company culture that identifies risk

By Riaan Bekker – In 1987, a London Underground ticket seller was alerted to a burning tissue on one of the escalators. They duly put it out, but didn’t report the incident. If they had, the slowly-building inferno under the station might have been discovered in...

Does your mobile strategy leave you open to cyber- crime?

By Sanjay Vaid – A report by IDC predicts that there will be over 1,7-billion smartphone users by 2020. When added to other figures supplied by the IDC’s FutureScape: World Mobility 2017 Predictions report, IT spending on mobile is predicted to peak at 50% of...

Share This