Cybersecurity Law

Cybersecurity or information security is a crucial part of information management. We are experts on the legal aspects regards the security of information (infosec). You can read our advice, or about the products or services we offer related to this focus area below:

DORA compliance for vendors – a practical playbook

DORA compliance for vendors is now a live requirement, and selling technology to European financial firms is therefore like constructing a new building in a crowded city: you must meet the code, welcome inspections, and prove the structure can take [...]

By |2025-11-14T19:33:31+02:00November 14th, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Telco cybersecurity in South Africa – finding a signal in the noise

Let's talk telco cybersecurity in South Africa. Securing a telecommunications network is like trying to tune into a radio station amid heavy static: operators must carefully adjust both their security controls and their compliance processes to cut through the noise. [...]

Cybersecurity compliance mapping – finding every obligation

What is cybersecurity compliance mapping? Navigating cybersecurity compliance today is like conducting a precise archaeological dig: you must carefully uncover each layer of obligations without damaging your organisation's underlying structure. Each jurisdiction, sector, and obligation presents distinct challenges, demanding meticulous [...]

By |2025-07-31T11:41:07+02:00July 22nd, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Data classification best practices

We've all got that chaotic drawer at home — a messy collection of old chargers, mystery keys, forgotten receipts, and batteries that may or may not work. While such clutter at home might only cause mild frustration, allowing your business [...]

Cybersecurity is mission-critical

Imagine your business as a body, thriving and responding to opportunities, with your digital systems acting as its nervous system. Just as any impairment to nerves can paralyse a body, a cybersecurity breach can disrupt or incapacitate your organisation. Cybersecurity [...]

By |2025-07-10T10:47:28+02:00July 10th, 2025|Categories: Cybersecurity Law|Tags: |

Practical data classification framework

Managing data effectively in any organisation can feel like navigating an intricate roundabout without clear signage — a confusing, inefficient, and costly process prone to mistakes. Poor data quality can significantly impact your organisation's decision-making capabilities, resulting in operational inefficiencies, [...]

By |2025-07-04T07:04:30+02:00June 21st, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , |

Cybersecurity compliance fairy tales – dispelling the myths

It's cybersecurity compliance fairy tale storytime. Let's banish them to the past, where they belong. Cybersecurity compliance can feel like chasing dragons — many discuss it, but few truly understand how to implement it effectively. Organisations often mistakenly believe that [...]

By |2025-06-05T18:29:44+02:00June 5th, 2025|Categories: Cybersecurity Law|Tags: |

South African cybersecurity laws – unravelling the knot

Understanding South African cybersecurity laws can feel like trying to cut through the legendary Gordian knot - a challenging yet essential task. Cyber threats are increasing rapidly, making it crucial for organisations in South Africa to understand these regulations clearly. [...]

By |2025-10-20T09:32:08+02:00June 4th, 2025|Categories: Cybersecurity Law|Tags: |

SARB Cybersecurity and Cyber-Resilience Directive

The South African Reserve Bank (SARB) has issued a Cybersecurity and Cyber-Resilience Directive focused on strengthening cybersecurity and cyber-resilience within the National Payment System. Since the financial sector plays a vital role in our economy, SARB expects all payment institutions [...]

By |2025-05-29T21:12:47+02:00May 29th, 2025|Categories: Cybersecurity Law|Tags: |

King V and cybersecurity – locking down corporate governance

The King V Code is changing corporate governance in South Africa by moving cybersecurity from a purely technical issue to a central responsibility for company boards. The Institute of Directors in Southern Africa (IoDSA) published King V's draft on 24 [...]

By |2025-05-26T14:58:04+02:00May 26th, 2025|Categories: Cybersecurity Law, Governance|Tags: , , |

World Password Day: fast tips for robust passwords

Happy World Password Day! It is on the first Thursday of May each year. The day is here to raise awareness of the crucial need for robust and unique passwords for all your online accounts. The need is pretty [...]

By |2025-06-09T12:27:48+02:00May 1st, 2025|Categories: Cybersecurity Law|Tags: , |

Password manager: a quick win to improve security

Get a password manager to improve your security. You have signed up for a new service, and they ask you to create a password. The thought of having to create a new password is a nightmare for you. You ask [...]

By |2025-06-09T12:22:44+02:00April 26th, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: |