Posts in Information Security

How The Mobile Fraud Messaging Framework Protects Your Clients and Their Data

By:Lauren Van Niekerk

Find out more about the Mobile Fraud Framework for enterprises, and these protocols help protect both your clients and their data.

Read More

Is WhatsApp Safe for Banking? Scandal Reveals Vulnerability

By:Waheed Adam

New research reveals vulnerabilities in WhatsApp making the app susceptible to hacking. iTouch executive Chairman, Waheed Adam, investigates how this discovery affects the new WhatsApp banking technology.

Read More

How The A2P Code of Conduct Affects Bulk Communication

By:Lauren Van Niekerk

MEF has now put forward a strict code of conduct for application to person messaging providers to ensure ethical practices and the reduction of fraud within the messaging industry

Read More

How To Protect Yourself Against Fraudulent Phishing Emails And Messages

By:Lauren Van Niekerk

Don't be susceptible to common fraudulent scams. Know your facts and learn how to protect yourself against phishing!

Read More

SMS As An Authentification Element to Ramp-Up Security In Your Business

By:Lauren Van Niekerk

Secure your business transactions by making use of a cost-effective SMS solution to in the authentification process.

Read More

Essential Tips To Protect Your Data

By:Staff Writer

Get your online data security checklist here and make sure you practice the following safeguards to ensure you're online data is stored safely and reduce the risk of scamming or phishing attacks on your accounts

Read More

Case Study: How iTouch Provides Cyber Security To Financial Institutions

By:Wafieka Bruckner

A case study on how iTouch provides a secure messaging solution for major South African banks and how our products reduce the risk of cybersecurity and financial fraud.

Read More

POPI, GDPR and Their Effects on Your Business Explained

By:Waheed Adam

South African POPI legislation will soon come into full effect. We take a closer look at these acts and how they will affect your business.

Read More

Why You Should Use 2 Factor Authentication

By:Staff Writer

We break down what 2 Factor Authentication is, why it is imported in securing you and your user data and how it can help your business and improve the quality of leads, data, sales & customer retention.

Read More

A2P messaging : RCS, Fraudulent Vendors and Data Security

By:Waheed Adam

Waheed Adam, Chairman of iTouch Messaging, describes the challenges facing businesses using A2P SMS and the negative impact fraudulent messaging providers have on the industry, and the work being undertaken by MEF to educate the market.

Read More

Case Study: How Bulk SMS Provides A Secure Communication Platform For Banking

By:Wafieka Bruckner

A case study on how iTouch provided a secure bulk SMS solution for a major South African bank to help them improve their customer communications.

Read More