Risk Management

Approaching ICT Policies Systematically

There are frequent calls for yet another ICT policy, often overlapping existing ones. A holistic view – an ICT policy framework – can reduce the effort to create and maintain policies, and deliver benefits through increased compliance.

Read More »

Can Password Managers Still Be Trusted?

From data breaches to identity theft, enterprise users have lost confidence in the capabilities of password managers to ensure their security given the multiple incidences of hacking. IBRS explores the relevance of these tools where the growth of threats and vulnerabilities undermine organisations’ safety.

Read More »

Corruption Prevention and Response

Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.

Read More »
data center

Should Data be Masked?

The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.

Read More »

Search