19.4 C
Johannesburg
Sun, Nov 28, 2021
Advertisement
Home Tags Graham Croock

Tag: Graham Croock

Cyber governance – future sustainability

0
It is a common belief that 'data is the new oil', and Information Technology (IT) supports almost every modern-day transaction, from the delivery of electricity and water to banking, shopping, manufacturing, and correspondence. The confidentiality, integrity, authenticity, and accessibility of information that enable these operations must be ensured to avoid the failure of related and unrelated information, devices, and activities. These failures expose businesses and individuals to the risk of reputation, income, assets, and the very endurance of the business or organisation and as a going concern. As a result, like sustainability, cybersecurity is now a critically important 'C-suite' issue.

Cyber governance – vendor cybersecurity assessment vital!

0
Many organisations in today's digital landscape rely heavily on third-party vendors who help carry out delegated operations. A third-party vendor could be a company or entity that provides certain services to your business.

Cyber governance – the challenges of interoperability

0
Information has undoubtedly become one of the most valuable assets for organisations, and whose dependence on it is constantly rising. At the same time, the frequency, sophistication and ferocity of cyberattacks are also increasing, posing a significant threat to business environments.

Cyber governance – the human factor

0
Cyber and information technology security governance refers to the system by which an organisation directs and controls IT security and, to a large extent, involves decision making to mitigate cyber risks. By definition, this implies that cyber governance determines who is authorised to make decisions regarding the adoption of frameworks and the design and implementation of effective controls, which to a significant extent rely on continuous human involvement.

Cyber governance – risk management & reporting now critical!

0
Recent global events, specifically the global COVID-19 pandemic, have caused widespread business disruption and transformation, forcing businesses to adapt to new ways of working in an extremely short period.

Cyber liability insurance

0
Every organisation with a network, an online presence and holding or accessing confidential data is at risk of cyber-breach or attack. The very nature of the internet means that cyber criminals from anywhere in the world can hit any specific targets.

2018 Cyber trends and recommendations for 2019

0
Cyber-attacks are increasingly becoming more and more sophisticated, and the magnitude of their impact across all industries globally is at an all-time high. A number of reports in the last two years revealed that the BRICS economies (Brazil, Russia, India, China and South Africa) were found to be amongst the largest victims of cybercrime. According to VM Advisory*, South Africa is listed as one of the ten globally most vulnerable countries to cyberattacks.

Internet of Things (IoT) security concerns may hamper growth

0
Businesses are, for a large part, uninformed and risk averse towards securing IoT. Enterprise, industrial and commercial IoT is a sticking point for business, particularly in South Africa, where boards of directors and senior executives are not yet knowledgeable about the benefits. This causes them to be exceptionally averse to risk, but this is changing as younger and more informed ‘tech-savvy’ executives are being appointed to boards.

Time to take the cyber threat environment seriously!

0
On a recent visit to BDO in Norway, it struck me that many South African-based businesses and organisations are increasingly exposed to cyber threats and vulnerabilities of which they are blissfully unaware.

Deploying AI for cyber defence in depth?

0
As any business grows, data sharing increases in both volume and frequency. Every one of these digital relationships presents an expanding set of cyber risks. Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the ever increasing risk of a cyber-attack businesses are finding it increasingly difficult to keep up with the rapidly evolving cyber threats?

MOST POPULAR

Member Login

Forgot Password?

Join Us

Password Reset
Please enter your e-mail address. You will receive a new password via e-mail.