Tag: Business Email Compromise (BEC)
Building a human firewall through gamified learning
Cybercriminals don’t just target systems. They target people. Nearly 70% of cyber incidents stem from preventable human mistakes. This makes an untrained workforce the weakest link in any organisation. Enter gamified learning. This approach to cybersecurity training replaces routine compliance checklists with story-driven challenges based on real-life scenarios.
DMARC compliance – essential for email confidence
Domain-based Message Authentication, Reporting and Conformance (DMARC) is becoming non-negotiable for South African businesses. Major global email providers are tightening authentication requirements. Our role as a managed IT services and cybersecurity provider is to urge local organisations to act now.
BEC cyber threat protection – staying vigilant amid year-end fatigue
As the year ends, businesses face year-end fatigue and the pressures of the approaching festive season. This period, marked by heavy workloads and rushing to meet targets, creates opportunities for cybercriminals to exploit vulnerabilities. One prominent method is business email compromise (BEC), a sophisticated cybercrime targeting organisations via email system infiltration. A common BEC tactic involves altering banking details on invoices.
Cyber insurance risk management
These are times of unprecedented change and disruption. New technological innovations and geopolitical events are just two of the major catalysts of change in the landscape of risk. In times of volatility, businesses are often faced with increased risk exposure, with opportunistic cybercriminals at the ready to exploit vulnerabilities and take advantage of loopholes.
The role of internal controls and audit against cybercrime
Internal controls are an essential component of any financial management system. It helps your organisation retain financial integrity, meet regulatory requirements, and compile reports essential for improving the business. These processes are especially crucial in accounts payable (AP) departments to manage financial transactions and ensure that payments are authorised, accurate and properly documented.
The hidden dangers lurking in your inbox – stay secure and...
According to estimates by our experts, the average share of spam in global email traffic in 2023 was 45.60%. This deluge of unwanted emails not only clogs up inboxes, but also consumes a significant amount of time and resources. On average, each year, employees spend between 5 and 18 hours sorting through spam, and when scaled to an organisation with hundreds of employees, this translates into huge amounts of lost productivity. Yet, the wasted time is just the tip of the iceberg.
Email compromise – defend yourself or pay the price!
Don’t let your business be punished for, and by cyber fraud. As the business landscape rapidly evolves, a general awareness of security vulnerabilities is no longer enough. Cyber fraud, data and payment breach risks need to be managed urgently and strategically with the right tools.
The anatomy of a scam
The rise in finance and accounting cybercrime through phishing and Business Email Compromise (BEC) has made headlines with massive implications for South African companies with gaps in their payment systems. However, robust financial controls together with strong server, IT, and email monitoring processes aren’t enough if staff aren’t savvy to the psychological tricks scammers use to manipulate people, making them more vulnerable to tricker and deception.
Are your Excel spreadsheets a cybersecurity risk?
The use of spreadsheets in accounting and finance departments has vastly improved data analysis and enabled fast and accurate reporting, computing and information storage. Life without them is almost unthinkable. However, danger lurks within and although the use of macros in Excel to automate processes can enhance efficiency, macro malware can put your entire business at risk.
Check before you click and fight the Phish!
While phishing scams are nothing new and have not changed drastically since their inception several years ago, we have seen some changes in terms of the techniques used, as well as the sophistication of content. From a tech perspective, the general technology used to pull off these social engineering attacks remains the same.






























