business email compromise

Webinar | Practical tips to deal with business email compromise

Organised crime is the third largest economy globally with an estimated value in 2025 of US$ 10.5 trillion. Only the economies of the USA and China are larger. The Department of Statistics recently reported that 566,000 South Africans were victims [...]

By |2025-11-26T10:16:27+02:00September 3rd, 2025|Categories: , , , |Tags: , |

Pinnacle Micro v Govender | BEC

This case highlights the importance of verifying banking details before making electronic payments, especially when receiving a change of instructions. Who should care about this judgment and why? Essentially all businesses face the threat of business email compromise. This judgment provides [...]

Lester Connock Commemoration Fund v Brough Capital | BEC

In Lester Connock Commemoration Fund v Brough Capital, the high court held Brough Capital liable for a breach of agreement in administering funds for the Rotary Club of Rosebank. The court found that fraudulent email transactions totalling R3.1 million occurred [...]

By |2024-02-20T07:53:19+02:00November 29th, 2023|Categories: Cybercrime, Cybersecurity Law|Tags: , , |

Gerber v PSG Wealth Financial Planning | BEC

The main legal issue involved the court determining whether the investment company (PSG Wealth Financial Planning) had a contractual obligation to protect their client (Gerber) against financial losses caused by cybercrime, specifically when a fraudster hacked the client's email and [...]

Safi v Gascoigne | BEC

In Safi v Gascoigne, Safi sued Gascoigne Randon and Associates, a conveyancing firm, for a loss of R889,308.50 from a business email compromise (BEC).  Who should care about this judgment and why? The public because they need to be aware [...]

Your duty of care regards information security

Every organisation has a duty of care to establish and maintain appropriate information security. The judgment in Hawarden vs ENS illustrates that no modern business can operate properly and lawfully without establishing and maintaining appropriate information security. The facts of [...]