Small FSP that was fined R1.1m shares four lessons in FICA compliance

Don’t wait for an audit by a supervisory body before you get serious about complying with the Financial Intelligence Centre Act (FICA). This is one of the messages the owner of a small FSP hit with a hefty fine has for accountable institutions. The FSCA announced on Tuesday that in June it imposed a penalty […]

Read More

Two-Pot Retirement System

The two-pot retirement system will affect members of all types of retirement funds: • Pension funds, provident funds, pension preservation funds, provident preservation funds, and retirement annuity (RA) funds. • Private sector funds and public sector funds. • Defined-benefit funds and defined-contribution funds. • Umbrella funds and stand-alone funds. Links to our brochures: Which funds […]

Read More

NCA Credit providers’ FICA obligations

In this video we delve into the NCR Credit providers’ FICA obligations. Featured in the interview is Gerrit Viviers Moonstone Compliance NCA Specialist with years of experience in the National Credit Act sector.

Read More

Certain FSPs and CIS managers must provide information about FICA compliance

The FSCA has issued a Directive to Provide Information (DPI) that applies to certain FSPs and managers of collective investment schemes. The purpose of the DPI is to assess the relevant accountable institutions’ compliance with the Financial Intelligence Centre Act (FICA). The Authority is collecting the information in its capacity as a FICA supervisory body. […]

Read More

NCR Desktop Audits

In this video we delve in the NCR Desktop Audits. Featured in the interview is Gerrit Viviers Moonstone Compliance NCA Specialist with years of experience in the National Credit Act sector. He explains what a Desktop audit is. How does an individual or organization get selected for one, what it entails of, and shares insights […]

Read More

Bridging the gap – where security meets compliance

DataGr8 advocates a security-first approach, empowering businesses by enhancing operations while ensuring robust protection against threats. While compliance standards provide essential benchmarks, mere tick-box exercises are insufficient. Aligning security measures with compliance requirements is crucial for comprehensive protection. From security to compliance: DataGr8’s approach begins by bolstering an individual or business’s security defences through their […]

Read More

Vulnerability management – DataGr8 on patrol

In the realm of cybersecurity, the significance of reactive measures, like Managed Detection and Response (MDR), cannot be overstated. However, equally crucial is the progression towards proactive security strategies. While reactive methods tackle incidents post-occurrence, proactive cybersecurity introduces an additional layer of defence. Vulnerability management serves as the linchpin in this progression. Shining a light […]

Read More

From your cellphone to your laptop – Lock up and go

DataGr8’s cybersecurity strategy, rooted in the NIST framework, emphasises security. Their Managed Detection and Response (MDR) service utilizes AI technology for comprehensive security coverage across all devices. With global teams available 24/7, DataGr8 swiftly responds to security incidents, remotely addressing breaches on behalf of clients. They not only resolve issues but also aid in recovery, […]

Read More

The cloud and how to protect against stormy weather

A third-party backup provider is crucial for cloud data storage because it adds an extra layer of security and control. Relying solely on cloud providers to safeguard an organisation’s data may leave it vulnerable to various risks. With a third-party backup solution, the business maintains ownership and control of its data backups independently, ensuring quick […]

Read More

Business email compromise – the wolf in sheep’s clothing

Securing email has become an indispensable aspect of modern cybersecurity strategy. As a primary communication channel, email is vulnerable to cyber threats such as phishing and malware. The concept of securing email revolves around ensuring the authenticity, integrity, and confidentiality of email communications. Robust security measures help organisations to protect sensitive data, prevent breaches, and […]

Read More