Key compliance issues in 2024

Billy Seyffert, the chief operating office of Moonstone Compliance, breaks down the key regulatory and compliance developments of 2024 and what’s on the horizon for 2025. Whether you’re a financial adviser, insurer, or an accountable institution under the Financial Intelligence Centre Act (FICA), this discussion offers valuable insights into the changes shaping the compliance landscape. […]

Read More

Two-pot retirement system and investment strategies

The introduction of the two-pot retirement system has sparked debate about whether retirement funds’ investment strategies should adapt to this new framework. Andrew Davison, the head of Institutional Business at Old Mutual Multi-Managers, discusses how the new system provides space for investment strategies to improve members’ outcomes at retirement.

Read More

Two-Pot Retirement System

The two-pot retirement system will affect members of all types of retirement funds: • Pension funds, provident funds, pension preservation funds, provident preservation funds, and retirement annuity (RA) funds. • Private sector funds and public sector funds. • Defined-benefit funds and defined-contribution funds. • Umbrella funds and stand-alone funds. Links to our brochures: Which funds […]

Read More

Bridging the gap – where security meets compliance

DataGr8 advocates a security-first approach, empowering businesses by enhancing operations while ensuring robust protection against threats. While compliance standards provide essential benchmarks, mere tick-box exercises are insufficient. Aligning security measures with compliance requirements is crucial for comprehensive protection. From security to compliance: DataGr8’s approach begins by bolstering an individual or business’s security defences through their […]

Read More

Vulnerability management – DataGr8 on patrol

In the realm of cybersecurity, the significance of reactive measures, like Managed Detection and Response (MDR), cannot be overstated. However, equally crucial is the progression towards proactive security strategies. While reactive methods tackle incidents post-occurrence, proactive cybersecurity introduces an additional layer of defence. Vulnerability management serves as the linchpin in this progression. Shining a light […]

Read More

From your cellphone to your laptop – Lock up and go

DataGr8’s cybersecurity strategy, rooted in the NIST framework, emphasises security. Their Managed Detection and Response (MDR) service utilizes AI technology for comprehensive security coverage across all devices. With global teams available 24/7, DataGr8 swiftly responds to security incidents, remotely addressing breaches on behalf of clients. They not only resolve issues but also aid in recovery, […]

Read More

The cloud and how to protect against stormy weather

A third-party backup provider is crucial for cloud data storage because it adds an extra layer of security and control. Relying solely on cloud providers to safeguard an organisation’s data may leave it vulnerable to various risks. With a third-party backup solution, the business maintains ownership and control of its data backups independently, ensuring quick […]

Read More

Business email compromise – the wolf in sheep’s clothing

Securing email has become an indispensable aspect of modern cybersecurity strategy. As a primary communication channel, email is vulnerable to cyber threats such as phishing and malware. The concept of securing email revolves around ensuring the authenticity, integrity, and confidentiality of email communications. Robust security measures help organisations to protect sensitive data, prevent breaches, and […]

Read More

Cyber security awareness training – it starts with people

Cybersecurity is more than just technology – it’s about the convergence of people, business processes, and technologies. In this interconnected landscape, people are the vital link that can either strengthen or weaken a company’s defences. That’s why cybersecurity training is crucial – to empower individuals to become the first line of defence, creating a robust […]

Read More

The five pillars to surviving cybersecurity

Joint Standard 1 of 2023: Information Technology Governance and Risk Management and the draft Joint Standard: Cybersecurity and Cyber Resilience Requirements, published by the FSCA and the Prudential Authority, set the bar for cybersecurity practices, aiming to protect data, systems, and reputation. These standards align closely with the NIST cybersecurity framework, which includes five key […]

Read More