×

Warning

JUser: :_load: Unable to load user with ID: 4028
JUser: :_load: Unable to load user with ID: 4269
JUser: :_load: Unable to load user with ID: 4128

Protecting Your Business Against Cyber Fraud

Published: 05 October 2021

Since the start of the Covid pandemic, the number of cyber-attacks on companies, banks, municipalities and other large institutions has increased. The most recent attack against the Transnet port authority affected container terminal operations and disrupted cargo movement. It was highlighted in the media as unprecedented since it was the first time the integrity of the country’s maritime infrastructure had ground to a halt. It is envisaged that similar attacks across Africa and the rest of the world will most likely continue to increase in both number and severity.

What is Cyber Fraud?

This type of fraud pertains to criminal activities over the internet or via email. It includes the crimes of identity theft, hacking, phishing and other scams to attempt to defraud or take advantage of victims. These victims can be individuals or companies. Cybercriminals use the information they illegally obtain for their own financial gain, and there are concerns that the money is used to fund terrorist activities.

What are the Types of Cyber Fraud?

Both individuals and companies need to understand the basic types of cyber fraud. Cybercriminals use several different strategies to commit fraud, including:

  • Data breaches. This is when sensitive or confidential information is stolen from individuals or companies and moved from a secure location to an unprotected environment.
  • Malware. Malicious software is used to damage or disable devices with the intent to steal personal or sensitive data.
  • Ransomware. This prevents users from accessing their own critical online information and is then held ransom in return for payment to restore it. Usually, ransomware is delivered via phishing attacks.
  • Phishing. This has caused many victims to be fooled into sharing their personal, financial or login details through email or other online messaging services.
  • Denial of Service. This interrupts online traffic to a business service or network for purely malicious intent.
  • Business Email Compromise. This is a highly sophisticated attack that compromises legitimate email accounts, causing businesses to make unauthorised payments.
  • Credit Card Scams. Although there is a broad awareness of these types of scams, they continue to lure victims with “too good to be true” deals, where victims end up unwittingly divulging their personal details to criminals.
  • Cybercriminals are highly inventive, and the list continues with online dating scams, lottery scams, and Nigerian Prince scams.

How can you Protect Yourself or Your Business Against Cyber Fraud?

Besides training yourself and your employees to recognise possible cyber threats, it is essential to remain vigilant and use common sense to avoid being exploited.

It is also vital to install the necessary technology at every touchpoint to prevent cyber-attacks as far as possible, and conduct regular IT security audits.

Take This Mini IT Security Audit

  • Do you have an anti-virus on your server and workstations?
  • Do you have threat protection on your email?
  • Do you have a firewall with analyser software?
  • Do you have email archiving?
  • Is your critical data backed up off-site?
  • Does your current IT Company control your network, or do you?
  • Is your security monitored efficiently, and do you know when you are being hacked?
  • Is your server locked down (do users have free reign to everything on your server) sufficiently?
  • Are you secure from an internal point of view? Your biggest threat is your internal users because they have no concept of what they are doing.

If you answered “no” to even one of these questions, you need to upgrade your IT security and urgently!

Westech undertakes in-depth IT security audits and quickly implements the necessary products and services.

Contact us to limit your immediate risk, improve network security and prevent cyber-attacks.

When Last Did Your Company Conduct an IT Business Review?

Published: 14 September 2021

The primary objective of an IT business review should be to obtain a clearer picture of the current state of your business's IT infrastructure in terms of how effectively it is supporting your business operations. In other words, it determines the strengths and weaknesses of your company's IT framework.

The current rate of technological developments makes it crucial to implement the right technology for your business. A professional IT company can undertake this IT review to ensure that your business is using the latest technology and that this technology is relevant to your business operations, thus ensuring that you are only paying for what you require.

Objectives of an IT Business Review
This in-depth analysis of your business's IT environment should include everything from hardware, software, IT infrastructure and assets to existing applications and IT personnel. This process will also allow you to update your IT strategy, which can provide your company with a competitive advantage.

The three main areas that are included in this review are:

  • IT Performance
  • IT Compliance
  • IT Security & Risks

IT Performance Review
Existing IT systems and processes need to be evaluated under this review to measure how effectively they contribute towards the daily business operations and how prepared the company is for business continuity in the event of an incident or disaster. This review will provide objective insight that should identify operational inefficiencies and waste resulting in potential cost-savings.

IT Compliance Review
A regular review of a company's compliance with IT-specific policies, laws, regulations and industry standards is vital. This is even more relevant with the introduction of the Protection Of Personal Information Act (POPIA). Failure to comply opens up your business to significant fines and reputational damage. Westech, a top IT company in South Africa, advises firms on complex, cross-functional issues and on how to develop and implement strict data protection policies to ensure POPIA compliance.

IT Security and Risk Review
The rise in cyber-crime increases the risk of sensitive data held by a company being stolen or held for ransom. Therefore, operating system policies and asset management processes need to be regularly reviewed for inefficiencies and updated accordingly to reduce these risks.

Westech's IT audit consultants enhance this IT assessment process by providing companies with a customised IT review that recognises each business's unique internal control, compliance, security and performance requirements.

This professional IT service provider’s proven process reduces the overall risk and provides relevant, actionable advice to your IT department on how to improve their service levels to the business. Contact Westech for an obligation-free quote.

Is Your IT Business Model Relevant to a Radically Changed World?

Published: 06 August 2021

The traditional business environment is no more as consumer behaviour has shifted since the start of the pandemic. In addition, the challenges of working from home have increased the pace of digital transformation resulting in a disruption to technology and existing IT business strategies as the rate of business innovation rapidly increases.

Savvy business owners have already recognised that their IT departments are not an island on their own. Operational processes, organisational structures, and value chains are directly affected by outdated IT strategies, all of which can negatively impact company revenue. New technologies are needed to increase customer support, implement automation and clean up redundant or conflicting systems.

Most company executives have a basic understanding of the Internet of Things (IoT), Artificial Intelligence (AI), digital transformation and the like. Still, they are confused about how these different IT business models can be applied to their businesses. It helps to understand that these digital offerings are purely an extension to existing services, similar to an app, that enhance their ability to engage with their clients and meet their rapidly changing requirements.

New digital technologies need to create value for the consumer in terms of making their life easier. Whether this involves enabling them to access your business quickly, obtain information efficiently or improve your delivery turnaround times to them, your company’s objective should be to monetise your IT business model.

Strong Leadership Required To Frame Conversations Around Digital Transformation
To fully integrate these new technologies, your IT business model needs to be flexible, efficient and cost-effective to deliver significant value to all areas of your business, as well as to your clients. However, one significant change required and frequently overlooked is the cultural change needed within each company to walk away from outdated processes. This dynamic requires strong leadership skills to steer the business through the initial bumps and curves in the road ahead before a digital transformation can be successful.

Business executives need to consider the following elements when implementing a thorough digital transformation strategy:

  • Customer experience
  • Operational processes and flexibility
  • Company culture
  • Technology integration

While leadership may have the know-how when it comes to customers, operations, and their staff culture, integrating the correct technology will support cost-saving initiatives and allow IT to become the primary driver of business innovation.

The Value of an Experienced IT Company During Digital Transformation
Engaging the services of a professional and experienced IT company will assist your to build new capabilities tailored to your exact requirements, rather than offering you a general “one-size-fits-all” solution. It will also allow the employees to concentrate on the business activities at hand while leadership manages the essential cultural aspects of the company. This will, at large, relate to possible changes in job titles, departments and business processes, which may cause people to fear that their jobs are at risk and result in demotivation and resistance.

Westech, a professional IT support and services partner in South Africa, is highly experienced at servicing all major business sectors and assists companies with their digital transformation drives. Visit their website for further information.

IT meets business as technology leaders gear up for IDC's South Africa CIO Summit 2015

Published: 19 March 2015

International Data Corporation (IDC) today announced that more than 100 key ICT decision makers will be in attendance at its upcoming South Africa CIO Summit, to be held at The Maslow Hotel in Johannesburg on March 24 and 25 under the theme ‘IT Meets Business’. The global advisory services firm said that technology leaders from the private sector will join senior government advisors and a roster of highly influential CxOs at the event as some of the world’s most innovative technology vendors address the key issues facing organizations in today’s constantly evolving ICT environment.  

“Across the country, organizations are faced with the task of driving innovation and implementing emerging products and services while also trying to improve operational efficiency,” says Mark Walker, associate vice president of sub-Saharan Africa at IDC. “This will be a key topic of discussion during the two-day summit, as will the importance of closely aligning the strategies and goals of the organization’s IT and business functions.”  

Walker says that the CIO today is facing a number of different challenges which has forced them to change the way they operate within the organization. “They need to focus on business priorities rather than just a purely technical discussion, and are continuously tasked with ensuring that the technology they implement drive business priorities,” he says. “This means that in order for them to succeed, they will have to be able to exert influence within other parts of the business, translating technology terminology into business speak and showcasing the value that these solutions bring to the business as a whole.”  

IDC is also pleased to announce that it will be introducing a set of two unique, informative workshops, based on its IT Executive Programs. IDC’s IT Executive Programs consist of a series of research agendas aimed at helping today’s IT executives make more effective technology decisions. “Our IT Executive Programs are underpinned by accurate and timely fact-based research created to assist IT executives in mitigating technology risks, maximizing the effectiveness of IT investments, and identifying and capitalizing on new opportunities,” says Walker. “The aim is ultimately to enable IT executives to make decisions that drive innovation and agility across the organization while ensuring that IT and business objectives are fully aligned.”  

The CIO Summit presents an opportunity for CIOs and ICT professionals to gain insight from industry experts as well as CIOs on critical business and technology issues. IDC analysts along with numerous local and global ICT vendors will be on hand to present their unique insights into the trends that are shaping ICT adoption across the country, while a variety of senior line-of-business executives will offer that all-important non-IT perspective.  

For more information about IDC’s South Africa CIO Summit 2015 and to learn about the range of flexible partnership opportunities on offer, please contact Michelle Meldau, IDCs sales manager for Sub-Saharan Africa at This email address is being protected from spambots. You need JavaScript enabled to view it.. You can also tweet about the summit using the hashtag #IDCSACIO or visit the dedicated event website at www.idcciosummit.com/johannesburg.  

About IDC

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy. More than 1,000 IDC analysts provide global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries worldwide. For more than 51 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world's leading technology media, research, and events company. You can learn more about IDC by visiting www.idc.com.  

IDC in the Middle East, Africa, and Turkey

For the Middle East, Africa, and Turkey region, IDC retains a coordinated network of offices in Riyadh, Casablanca, Nairobi, Lagos, Johannesburg, and Istanbul, with a regional center in Dubai.  Our coverage couples local insight with an international perspective to provide a comprehensive understanding of markets in these dynamic regions. Our market intelligence services are unparalleled in depth, consistency, scope, and accuracy. IDC Middle East, Africa, and Turkey currently fields over 130 analysts, consultants, and conference associates across the region.  

Contact for Media

Anulekha Shetty

Tel: +971 4 391 2741
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.  

Performanta, confirmed platinum sponsor at IT Leaders Africa Summit

Published: 10 March 2015

Event organiser Kinetic has confirmed that industry-giant Performanta has signed on as platinum sponsors for this year’s anticipated 6th edition of their successful flagship event; the IT Leaders Africa Summit.

The event, taking place from 18 - 19 March 2015 at The Maslow Hotel in Johannesburg, is set to go beyond your usual routine business conference, evolving to deliver on a more exciting, topical, trendy and current platform, utilising both the latest technologies coupled with the latest in conference trends internationally.

Together with Performanta, the event aims to deliver an expert-lead agenda that features an educational conference program backed by the latest in technology workshops and demonstrations. 

Performanta’s workshop; Safeguard your organisation now, your wallet will thank you later; focuses on measuring your organisation against the industry on 10 information security and privacy measures, derived from real-world assessments.

Performanta Consulting was established by Anthony Olivier 4 years ago, aligning information security consulting services to the Performanta Technology & Services stable. Performanta Consulting has provided services to primary South African banks, insurance companies, brokers, mining companies, service and retail organisations. Their key differentiator: senior, qualified, experienced consultants, integrated frameworks and fair pricing. Furthermore, the team has assisted in addressing security problems in seventeen African countries and has a thorough understanding of the continental landscape.

As thought-leaders in the industry, they are amongst the most active South African participants in industry conferences, blogs and podcasts.An expert-led advisory panel will lead the summit with industry giants Robert Sussman, co-founder and joint-CEO of Integr8; Hugo Timmerman, Head of IT Southern Africa at British American Tobacco; and Tunde Coker, MD of Rack Centre (A Jagal Group Company).

The event also features over 35 speakers, keynotes, panel discussions and numerous educational workshop sessions hosted by key industry providers, all sessions led by some of today’s most notable individuals who are shaping the IT landscape in South Africa and beyond.

Speakers, just to name a few, include; David Visser, CIO of Coca-Cola Southern Africa; Anthony Hlungwane, Group IT Director of Mr Price Group; Sal Laher, CIO Eskom; Rocky Gwewera, Global Head of Infrastructure Architecture at Sasol; Stephan Ekbergh, CEO and founder of Travelstart; and Sunil Joshi, MD and CEO of Neotel.

Some sponsors and partners include; Telkom Business, HP, Performanta and Blue Coat Systems, SITA, Airwatch, Kofax, Dimension Data, Neotel, Meso Systems, Sage Pastel Accounting and ERP Africa, and Blackberry.

For more information on the event to register to attend or to sponsor, visit www.itleaders.co.za or contact the event organisers Kinetic on +27 21 180 4700.Follow the event and stay up to date on Twitter. @ITLeadersAfrica and join in on the conversation using #ITLAfrica.

Addressing Cyber Security.

Published: 24 February 2015

As the pace of digital transformation increases, so does the frequency of high profile security incidents and information leaks. This often prompts complex and costly responses, as those who have suffered security breaches – and those who are trying to avoid them – seek ways to manage their exposures and comply with a plethora of industry standards, best practices and government regulations.

Joint silver sponsors at the 6th IT Leaders Africa Summit, SLVA and Ubusha will explore the mechanisms you could use to ensure a secure information-processing environment during their workshop presented by Kris Budnik, Managing Director for SLVA Information Security.

Attendees will hear how they can maximise existing capabilities and leverage the emerging wave of enterprise security technologies that tip the balance away from cyber-criminals and dishonest employees.

SLVA and Ubusha’s holistic response to minimising information security risks requires the ability to:

-Understand and manage who has access to information and systems within your environment and what they are able to do with such access

-Track and have the capability to influence the way that data is accessed, processed and shared within your environment

-Maintain oversight over that environment – ensuring that it remains reliable and free from vulnerabilities which may be exploited to bypass your access control and data governance policies  

Please note that the cut off date for applications to present a workshop at the IT Leaders Africa Summit is the 27th of February 2015.  

During these 60 minute educational workshops, leading industry vendors present their solutions and services in case study format to attending CIOs and IT Heads. Each session is limited to 15 delegates in order to encourage debate and discussion. The workshops are scheduled in advance as the topics are marketed to CIOs and business leaders during the build up to the Summit.  

For IT Leaders Africa Summit brochure advertising opportunities, contact This email address is being protected from spambots. You need JavaScript enabled to view it.   The 6th IT Leaders Africa Summit takes place on 18 & 19 March 2015 at the Maslow Hotel in Sandton, Johannesburg.

How can digital forensics assist in missing persons [child] cases?

Published: 18 January 2015

Digital forensics - the examination of cellphones, tablets and personal electronics in criminal, civil, domestic and missing persons investigations are dramatically changing the way cases are worked and solved. While technology has created new portals for predators searching for victims, it's also leaving telltale trails for forensic examiners.

It's the same technology that is used to track terrorists and to build cases against child pornographers, but increasingly it is becoming a factor in missing children's cases. Computer forensics technology has helped to locate a number of missing kids around the world.

The number of smartphones, tablets and personal devices examined by Rick Crouch & Associates has tripled in the past three years. In 2014, our forensic examiners searched 600 phones, computers and other devices in a wide array of cases at our various locations. It's now often the first piece of evidence investigators seek out.

With 90 percent of American adults now carrying a cellphone - 58 percent with a smartphone, according to the Pew Research Center - the devices have become the one constant in many people's lives - in their pocket or purse all day, on their bedside table at night. It's the alarm clock, home phone line, camera, chat forum, e-mail and social media terminal. Investigators use that almost constant phone activity to verify a suspect's or witness' statement and provide a log of a person's movements and activities. Smartphones can even be an eyewitness, recording a crime in progress.

"Electronic devices are just a treasure trove of information," said Rick Crouch. "The digital evidence is one of the first things we go to. They leave footprints all over the place: Who the missing persons [children] were last talking with, who they were tweeting with. They offer up a lot of clues about what has been happening in these peoples' lives in the past few hours and days."

"In the past it would take days or in some cases weeks to retrieve digital information from a computer. With new technology we can retrieve the same digital information on site within minutes or hours. This can make or break a case as those first few hours are key. At Rick Crouch & Associates we work with attorneys, private investigators and the general public in all types of criminal, civil, domestic and missing persons cases." added Rick Crouch.

Media Enquiries:
Rick Crouch
Rick Crouch & Associates
073 418-6996
This email address is being protected from spambots. You need JavaScript enabled to view it.

Cyber Crime Can Affect Your Business. Are You Protected?

Published: 18 January 2015

The profile of a computer criminal

Surprisingly, computer criminals tend to have no prior record of crime. Computer criminals also tend to be responsible, honest people in a position of trust. In fact, many of the businesses that fall victim to a computer crime, find out that it was one of their employees that was the perpetrator of the act. Most computer criminals are male, but the number of women as accomplices and actual perpetrators is growing in number. They range in ages from fourteen to thirty. These criminals are usually very bright and know a lot about computers and are willing to challenge themselves in the technological world. Generally, these computer criminals almost represent "normal" people. They do not seem the type that would want to harm or hurt something.

Most cyber criminals display some or most of the following characteristics:

  1. Some measure of technical knowledge
  2. Disregard for the law
  3. High tolerance for risk or need for "thrill factor."
  4. "Control freak" nature, enjoyment in manipulating or "outsmarting" others
  5. A motive for committing the crime

Computer crime is becoming a big problem in our world today.Many of these crimes affect our jobs, our money, our community and our lives. 

Cyber Crime:The Risks to Small Business

One of the major victims of the increasing wave of computer crime is businesses.

Computer crime can have devastating effects on businesses.The increase in the use of information technology has raised the risk of of an unwanted intruder focused on either damaging their computer system or stealing information and / or files. These computer crimes can prevent a business from performing its day to day activities. 

With computer crime becoming an increasing problem, it is important to report computer attacks. It is said that many businesses do not report an intrusion of their computer systems for fear that there would be a loss of confidence in their company which would translate into lost business. What many of these businesses do not realize is that the perpetrator may have left a back door to get back into the system thereby leaving themselves open to future attacks. This is why it is so important to report even the smallest incident to the authorities. 

A McAfee-sponsored study by the Center for Strategic and International Studies found that Global cyber-crime costs as much as 0.5 percent of global GDP. Global cyber-crime likely cost individuals, companies and governments between $375 billion and $575 billion in 2013, according to a report published on June 9 2014 by the Center for Strategic and International Studies.

Even after all this evidence, it still seems that businesses have no idea how big this problem actually is. Businesses have yet to address security problems within their own systems. Many flaws and openings exist, yet businesses are doing little or nothing to protect them selves from computer crime.

The most recent trend shows cyber criminals demonstrating the dangerous ability to hone in on specific victims and applications. Companies recognize the danger of such cyber attacks. In fact, 70 percent of firms rank viruses and hacking ahead of fraud and physical break-in as their biggest threats. Given this fear and the insidious nature of today's threats, placing IT security high on the risk management agenda is vital.

Today's cyber criminals typically arm themselves with Trojan horses. Accounting for 82 percent of the new threats detected in 2006, Trojans are devastating programs that pretend to be legitimate software only to deploy hidden, harmful functions.

Trojans can and often do more than just attack a computer. Approximately half of today's Trojans contain spyware that cyber criminals use to log key strokes, steal sensitive information or gain remote access to the victim's computer.

Some say that businesses have a misconception on who is doing the security breaching. Many have stereotyped hackers as misguided young teens looking for a little excitement. Yet, many of these perpetrators of computer crime are very intelligent and have the patience to wait it out. Their hacking methods seem organized and planned out. This is the work of professionals.

Businesses must learn to take these attacks seriously. If they choose to keep their systems and security out of date, the cost and volume of these attacks will continue to increase. Do not wait for a devastating intrusion into your computer system before you take action.

How Criminals Target Small Businesses

Cyber criminals have developed dozens of ways to exploit the vulnerabilities that may exist in your business. From email scams that target employees to malware that gathers sensitive information, the attacks are complex and effective. Knowing what you're up against will help you protect against it.

Here's a breakdown of the kinds of attacks small businesses can expect to face. This is based on a four-week study of types of attacks participating small businesses experienced

  • Viruses, worms, Trojans - 100%
  • Malware - 96%Botnets - 82%
  • Web-based attacks - 64%
  • Stolen devices - 44%
  • Malicious code - 42%
  • Malicious insiders - 30%
  • Phishing & social engineering - 30%
  • Denial of service - 4%

This indicates that virtually all small businesses have to deal with viruses, worms, trojans, botnets, and other malware. In fact, this is true for everyone online, from individuals at home to large multinational enterprises.

What Cyber Criminals Are After

Cyber criminals look for information on your business and your customers. Whether it's kept on servers, is sent through emails or is sitting archived on your employees' desktops, cyber criminals have ways to infiltrate and harvest your valuable data.

Here's a list of what they're looking for:

  • Customer records (including contact information, sales history and passwords)
  • Contact lists
  • Employee Information (including email addresses and passwords)
  • Company banking information
  • Credit Card numbers
  • Patents
  • Plans
  • Formulas

They also want to find a way to:

  • Compromise servers
  • Infect computers with viruses and malware
  • Access your system

Suggested Solutions to Problems of Computer Crime:

Firstly businesses need to accept the fact that computer crime is a problem and realize that this problem is not just going to go away. 

Everything in their system, internally and externally, needs to be checked and secured. Set up a secure system that is as close to fail proof as possible. If businesses want to stay afloat and keep a competitive advantage, they must first make sure they do not have a surprise attack that closes their doors.

Some questions businesses should be asking themselves – or using trusted advisers to do so.

  • Your internal network.How strict is your wireless access?
  • Who has permission to install software?
  • How regularly do you backup critical systems?

Internet-facing aspects of your network

  • How regularly are your internet connections and web applications vulnerability scanned or tested?
  • Is your firewall properly maintained?

Devices and mobile technologies are another key area. 

  • Are all laptops and tablets encrypted?
  • You need to consider the ways in which the hackers can get at your data. For example:
  • Are employees using their own equipment to access corporate data or systems?
  • Flash drives, External hard drives, Laptops, Tablets.

Businesses must report any known attack immediately. They need not necessarily go public with the information but hire a computer forensic examiner like Rick Crouch & Associates to track down the intruder, then with that evidence a criminal case can be opened. Many risks remain when these crimes go unreported. It is very important that these criminals are caught as soon as possible. That way we can help prevent any future cases, even against the same company.

As computer crime continues to become a bigger and more costly issue, greater measures must be taken to prevent them. These crimes are looked at as just white collar crimes, yet they cost people and businesses more money than any other crime. The punishment should fit the crime. This needs to be recognized as a problem and any business that wants to succeed should take this seriously.

These types of computer crimes are more common than we think. Businesses that use information technology and online communication as an everyday part of their business need to pay close attention to this issue. This is a threat that is not going away any time soon and, in fact, is only going to get worse.

Media Enquiries:

Rick Crouch
Rick Crouch & Associates
073 418-6996
This email address is being protected from spambots. You need JavaScript enabled to view it.

Tis the season to be vigilant!

Published: 19 November 2014

Foscam would like to issue a warning as we go into the silly season.

Christmas is such a magical time of year... lots to be thankful for and wonderful parties to attend. Some of us are lucky enough to get away for a change of scenery. Those of us who stay at home may tend to have a more relaxed outlook on life. But please, beware, criminals are most likely to strike when given half the opportunity, when your guard is down or even better, when a home is empty.

Foscam, leaders in surveillance cameras supply households and companies alike with security cameras that send live footage directly to your cellphone or web browser.

Foscam IP cameras, or in lamans terms, ‘internet cameras’, simply require a wifi signal that they can pick up on where they are installed (either ADSL or by means of 3G), and a standard electric point. Once the camera is configured, download an app to your smartphone and no matter where you are in the world, you will be able to login and monitor your most prized assets.

So if you are going on holiday this December, or simply want to beef up your security, why not take a look at our website, www.foscam.co.za where you can purchase your security cameras online. We deliver countrywide and sell a wide range of indoor and outdoor security cameras to suit your needs.

Foscam South Africa
Tel: 011 4695165
www.foscam.co.za

Understanding and mitigating the risks of social media in the workplace (Workshop 2014)

Published: 09 September 2014

Companies are rapidly seeing the benefits of social media. In fact, social media is becoming indispensable for business, but with all the benefits come threats and risks as well for the workplace. Frost & Sullivan’s Global Workforce Study found that 64% of respondent companies limit employee access to social media through content filtering and website blocking technology, 51% restrict access by setting and enforcing policy and 25% have no restrictions on the use of social media by employees.  

Businesses should define clear social media usage policies, specifying who can access social media, what sites they can access, when they can access them, where they can access them and what devices they can use to access social media during work hours. There should be no room left for confusion. Policies should be clear, well defined and communicated to employees.  

Professionals who would benefit by attending include HR Managers, Digital Marketers, Chief Risk Officers, Social Media Strategists, Office Managers, Marketing Managers, HR Consultants, Employee Benefit Managers, Legal Advisors, Digital Projects Managers, e-Commerce Managers, Risk Managers to name a few...  

Rosalind Davey and Khomotso Makapane will facilitate the workshop, teaching all attendees how to understand and and mitigate the risks of social media in the workplace. Both of the facilitators are qualified attorneys from one of South Africa’s top law firms Bowman Gilfillan and specialise in employment law and Rosalind is one of the few attorneys specialising in social media law.  

During the half day workshop social media statistics, constitutional rights, RICA, freedom of expression and the law of defamation, liability for defamatory content on social media and vicarious liability, handling social media misconduct, loss of confidential information and contacts as well as mitigating the risks of social media will be addressed. View full agenda and download registration form at www.aoevents.co.za

Workshop registration fee: R800 pp. Groups of 3 or more receive 10% discount.

Email the completed registration form to This email address is being protected from spambots. You need JavaScript enabled to view it. to secure your seat.

Page 1 of 2