Dawn raids by regulators at your business?

The risk is very real, writes Elisha Bhugwandeen, professional support lawyer in Webber Wentzel’s competition team In a climate of increased competition law enforcement, having the right tools at your disposal is imperative. The South African Competition Commission...

Neural biometrics the next generation of security

With security as the watchword at every turn and in practically every transaction in modern-day life, the unsettling reality remains that fraud, identity theft, and cybercrime are rapidly on the increase globally. In South Africa, the SA Fraud Prevention Services...

How can I be compliant at a reasonable cost?

While the cost of compliance has escalated due to the ever-changing regulatory landscape, which can often mean a ripple effect of change across the business, there are solutions that enable organisations to reduce these costs. Taking a closer look at what these costs...

The gap between the law and how to apply it

Emerging forces in the environment pose a variety of challenges for today’s legal professionals. Attorneys and corporate counsel are expected to keep abreast of increased regulatory complexity in local and global jurisdictions, while clients are facing cost challenges...

People power needed to win the online security war

It’s estimated that two-thirds of people online – more than 2-billion individuals – have had their personal information stolen or compromised, and a business falls victim to a ransomware attack every 40 seconds. The threats are changing constantly, and there’s an...

Liberty data breach: setting a precedent for GDPR? 

Over the Youth Day weekend, Liberty informed its customers, and later everyone else, that it had been the subject of a successful security intrusion. In a media statement, it claimed that an email repository had been compromised, and that an as yet undisclosed number...

Cyber threats real for industrial automation systems

The ability to connect Information Technology (IT) systems with Operational Technology (OT) systems, such as Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs), gives businesses access to information for a comprehensive...

A view of security from the front line

Balancing resources as security challenges rise is a major strategic problem for today’s business leaders. The list of brands whose credibility and finances have been damaged by cyber-attacks is unprecedented, and alarm bells are understandably going off across the...

Asbestos: the law and insurance

Built environment professionals are becoming increasingly aware of their roles and responsibilities set out in terms of legislation.  The legal and insurance implications for work done where asbestos is used or was used is far-reaching and requires adequate...

Shippers get serious about cyber threats

Major attacks like the NotPetya malware incident have been a wake-up call for the shipping sector, creating a renewed urgency around tackling the threats posed to vessels and supply chains, as well as prompting an increasing interest in cyber insurance. At the same...

What’s best: financial emigration or Double Taxation Agreement?

When it comes to choosing financial emigration (FE) or a Double Taxation Agreement (DTA), expatriates must understand that there can never be a one size fits all approach. FE requires certain criteria to be met before one can undergo the process, while a DTA will only...

SA a breeding ground for cyber attacks

As markets in fast growing economies race to join the digital revolution they are fast being hijacked by cybercriminals, who are preying on security vulnerabilities in some fledgling IT environments. By Keith Matthews, country manager: South Africa at Orange Business...

Share This