The web site is now storing only essential cookies on your computer. If you don't allow cookies, you may not be able to use certain features of the web site including but not limited to: log in, buy products, see personalized content, switch between site cultures. It is recommended that you allow all cookies.
Search for news

News & Views

...
Have You Forgotten About POPI?

Protection of personal information (POPI) was a hot topic last year. Continued compliance is important and, if you have not taken any steps towards compliance, you should not delay any longer. This article provides a timely reminder of your POPI obligations.

...
What Are the Most Common Types of Cyber-Attacks, And Which Vulnerabilities Do They Exploit?

Counting the Costs of Cybercrime is a three-part series. In part one, we highlighted the impacts of cyber related crimes on your organisation. The damage caused by a cyber incident can be reduced to the acronym: "CIA"(Confidentiality, Integrity, and Availability). Refer to the link here for part one. This part provides an overview of the most common and successful cyber-attacks and the vulnerabilities that are being exploited.

...
Moore Johannesburg Introduces Moore Cyber

Moore Johannesburg is excited to announce that they have established a cyber security centre of excellence led by a team of offensive and defensive cyber security specialists. In these dynamic times many of our clients have raised concerns regarding their IT security and cyber requirements. The need for a cyber resilience strategy is at the top of their list and we have assembled a team of security experts to develop comprehensive strategies and interventions to meet their needs.

...
Counting the Costs of Cybercrime. What Is the Impact of Cybercrime on My Company?

Cybercrime is growing as the use of the internet and business networks expand. Today, more than ever, businesses of all sizes rely on their networks, data and internet connectivity to conduct business. In this three-part series, we look at cybercrime's impact, how it is perpetrated, and what you can do about it. In this part, David Cohen looks at the impact of cybercrime on your business. 

...
The Tax Responsibilities of a Public Officer

The Tax Administration Act (“TAA”) requires every company carrying on business or having an office in South Africa to be represented by an individual residing in the Republic. A Public Officer is responsible for all matters relating to Tax Act and serves as the face of the company. Mohamed Chopdat investigates further.

...
S12H Learnership Allowance

The Learnership allowance is a great incentive offered by Government to encourage job creation. How does this allowance work? Geeta Kalan explains.

...
BHP Corporate Restructure Triggers Capital Gains Tax

On 31 January 2022, BHP Group finalised the unification of its dual-listed company corporate structure which has impacted South African shareholders. Shareholders who owned BHP Group shares on 28 January 2022, will be deemed to have disposed of their shares and acquired the new BHP Group JSE-listed shares and will have triggered a capital gains tax event. The effect of this transaction is likely to result in a realised capital gain. The taxable portion of this gain will be included in the shareholder’s taxable income for the year ended February 2022, even though no cash has changed hands.  

...
Provisional Tax Time

For all individuals, trusts, and most companies in South Africa, the second provisional tax return is due at the end of February. Here are some basic principles to bear in mind when attending to your provisional tax return for this period

...
Disney’s Share Price Drops As 4Q21 Results Miss Expectations

The Walt Disney Co. (Disney) released 4Q21 results on 10 November after the market closed, with the company missing consensus analyst estimates. This saw the group’s share price fall in after-hours trading, and on 11 November the share price was down 7% on the day.

...
Cyber Security: How To Avoid Email Compromising Your Business

It seems like we can’t go a day without hearing about the next big data breach. It appears almost normal to be at the will of cybercriminals. Lose everything or pay up. South Africa ranks third in the world for users experiencing the highest number of ransomware attacks, with 58% of these attacks being made against small-to medium-sized businesses. Carey Scott takes a closer look.