In today's age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few years. The office of the future is forcing business leaders to grapple with how to seamlessly integrate technology into the workplace as a means to increase productivity and efficiency.
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness around the important things that small business owners need to consider before paying cybercriminals to restore their encrypted information.
Part 2 - In my previous article on the subject (available here), I dealt with the arguments against using Advanced Electronic Signatures (Aes), and the false impression that that they are cumbersome and difficult to use. I also pointed out that used with appropriate electronic signature tools they are a business enabler and enable the execution of contracts many times faster than by our traditional use of handwritten signatures. Finally I addressed the significant cost savings element of using Aes.
Since its inclusion in the Electronic Communications and Transactions Act (ECT Act), some 16 years ago, the Advanced Electronic Signature has been treated a little like Cinderella, ignored by most and scoffed at by others.
While established insurance firm Liberty continues to throw everything it has at an investigation into the recent major data breach, the incident is a stark reminder to businesses that cyber security should be a constant priority – a company’s guard must always be up.
Invoice fraud is becoming more common in South Africa, perhaps in response to worsening economic conditions. Detecting and successfully prosecuting this type of crime is difficult, but the losses can be very high. This is one case where prevention really is better than cure, says John Mc Loughlin, MD of J2 Software, a leading supplier of information security, governance, risk and compliance solutions.
In the past, lawyers concerned with retaining the privacy and confidentiality of client information restricted the use of email for conducting business. It is why fax was, for an extended period of time, the way in which to communicate. Email was not secure and too easily risked being tampered with, or leaked - accidentally or on purpose.