Advertisement
Home Tags Security

Tag: security

Knowing your SARS status

Knowing your SARS status – a diagnostic report is essential

0
For many taxpayers, especially expatriates, managing South African tax obligations from a distance can be complicated. Years may pass without any direct interaction with the South African Revenue Service (SARS). During that time, key details such as contact information, banking details and tax number status often become outdated.

Shifting crime trends – are you prepared for the risks?

0
The latest Governance, Public Safety and Justice Survey has revealed that, despite slightly improved perceptions of safety within South African communities, housebreaking and burglaries remain a key concern. In 2024/2025, an estimated 1.5 million incidents were recorded. This represents 5.7% of households in the country.

Defying gravity and surviving disruption – for an AI-driven future

0
Will your business still be alive in 10 years? Many will not. The pace of change is leaving even Moore’s Law behind. Nvidia’s AI hardware supremo, Jensen Huang, recently claimed that AI capability has increased a million-fold in the last decade. He also suggested this growth may continue at the same pace. To say established businesses face disruption would be an understatement

Inside the 130-millisecond benchmark – instant payments explained

0
Consumers in shops all around the country expect payments to work as they should every time. They demand instant transactions, often blissfully unaware of the complexity that lies beneath. That is the job of a good payments service provider. A good payment provider keeps the technical complexity invisible while delivering service inside the 130-millisecond benchmark.

The key proactive IT support components for SMEs

0
In today’s digital age, small and medium-sized enterprises (SMEs) rely heavily on their IT infrastructure. It is essential for maintaining smooth operations and staying competitive. However, managing IT systems can be complex and time-consuming. This is especially true for SMEs that operate with limited resources.

The High Treason Club

0
On the night of 30 October 2002, eight bomb blasts tore through Soweto. The explosions left one woman dead and damaged vital infrastructure. A far-right white Afrikaner separatist group called the Boeremag carried out the attacks. Their stated aim was to overthrow the ruling African National Congress (ANC) government, rid the country of black people and reinstate a new Boer-administered republic.

Cyber threats – DR and CR explained

0
As ransomware attacks become increasingly common, businesses must understand the differences between Disaster Recovery (DR) and Cyber Recovery (CR). DR focuses on restoring IT operations after events like natural disasters, hardware failures or accidents. In contrast, CR is specifically designed to handle intentional cyber threats such as ransomware and data breaches.

Why Africa needs a homegrown investment platform

0
Africa is home to arguably the world's youngest and fastest-growing population. A burgeoning middle class now seeks ways to build wealth and secure financial futures. Despite this enormous potential, millions of Africans still face exclusion from global investment opportunities.

The stealthy attack chain of PDF files – hiding in plain...

0
Over 400 billion PDFs were opened last year. Adobe Acrobat users alone edited 16 billion documents. Today, more than 87% of organisations rely on PDFs for business communication. This widespread use makes them ideal for hiding malicious code.

Sovereign AI is reshaping geopolitics

0
Artificial intelligence (AI) is reshaping global power dynamics, economic frameworks, and security considerations. While it offers immense opportunities, it also raises significant concerns. These include governance, ethical standards, and its potential use in both civilian and military contexts.

MOST POPULAR

X

Forgot Password?

Join Us