logo
Employment and Labour Committee Welcomes Presentations on 2025-2030 Strategic and 2025/26 Annual Performance Plans of the Compensation Fund and Unemployment Insurance Fund (UIF)

Employment and Labour Committee Welcomes Presentations on 2025-2030 Strategic and 2025/26 Annual Performance Plans of the Compensation Fund and Unemployment Insurance Fund (UIF)

Zawya4 days ago

The Portfolio Committee on Employment and Labour has welcomed presentations on the 2025-2030 strategic plans, 2025/26 annual performance plans and budget estimates of the Compensation Fund and the Unemployment Insurance Fund (UIF).
The Compensation Fund and UIF are entities of the Department of Employment and Labour. The committee encouraged them to work in a coordinated manner together with sister entities within the portfolio, such as the Supported Employment Enterprises.
The committee believes that there is a minimal impact when the department and its entities work in silos on skills training and programmes to empower people living with disabilities.
The committee has directed the UIF to put measures in place to monitor and evaluate the impact made through its Labour Activation Programme. This programme is the department's initiative to minimise unemployment and stimulate job creation through skills development and financial assistance to employers and employees through the Temporary Employer/Employee Relief Scheme (TERS); it is implemented through the UIF.
The committee has encouraged the Compensation Fund and UIF to strengthen their ICT infrastructure to improve the turnaround time on benefit payments and minimise queues at service centres.
Having been briefed on the 2025-2030 strategic plans, 2025/26 annual performance plans and the medium-term expenditure framework of the department and its entities, the committee will now meet on Friday, 27 June 2025, to consider its 2025 budget vote report.
Distributed by APO Group on behalf of Republic of South Africa: The Parliament.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

South Africa to participate at the 4th International Conference on the Financing for Development in Spain
South Africa to participate at the 4th International Conference on the Financing for Development in Spain

Zawya

time14 hours ago

  • Zawya

South Africa to participate at the 4th International Conference on the Financing for Development in Spain

At the invitation of the President Pedro Sánchez Pérez-Castejón of the Government of Spain and United Nations Secretary - General António Guterres, the South African government, led by Minister of International Relations and Cooperation, Hon. Ronald Lamola will lead South Africa's participating delegation to the 4th International Conference on the Financing for Development Summit that is taking place in Seville on 30 June 2025 - 3 July 2025. This conference aims to address new and emerging issues in financing for development, including the need to fully implement the Sustainable Development Goals (SDGs) and reform the international financial architecture. President Ramaphosa has delegated Minister Lamola as the Head of Delegation for the Summit following recent political developments that require close monitoring and management in the country. South Africa's participation at the Summit aligns with its G20 Presidency objectives of solidarity, equality and sustainability in complementing and supporting the Summits' goals of reshaping the global financial system in support of the Sustainable Development Goals. On the margins of the 4th Financing for Development Summit, South Africa will convene a side event under the theme: 'Forging a common agenda to achieve debt sustainability in developing economies'. South Africa seeks to advance through cooperation and collaboration, sustainable solutions to tackle high structural deficits and liquidity challenges and to extend debt relief to developing economies which disproportionately affects countries in Africa. This event will bring together leading voices from various debt-related initiatives to identify synergies and areas of convergence. It will seek consensus and highlight solutions that enjoy broad support. South Africa's delegation to the 4th International Conference on the Financing for Development Summit comprises the Minister in the Presidency for Planning , Monitoring and Evaluation Hon. Maropene Ramokgopa, Deputy Minister of Finance David Masondo and senior government officials. Distributed by APO Group on behalf of The Presidency of the Republic of South Africa.

Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025
Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025

Zawya

time16 hours ago

  • Zawya

Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025

In 2025, nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks where malicious or unwanted software was disguised as popular online productivity tools, Kaspersky reports. Based on the unique malicious and unwanted files observed, the most common lures included Zoom and Microsoft Office, with newer AI-based services like ChatGPT and DeepSeek being increasingly exploited by attackers. Kaspersky has released threat analysis and mitigation strategies to help SMBs respond. Kaspersky analysts explored how frequently malicious and unwanted software are disguised as legitimate applications commonly used by SMBs, using a sample of 12 online productivity apps. In total, Kaspersky observed more than 4,000 unique malicious and unwanted files disguised as popular apps in 2025. With the growing popularity of AI services, cybercriminals are increasingly disguising malware as AI tools. The number of cyberthreats mimicking ChatGPT increased by 115% in the first four months of 2025 compared to the same period last year, reaching 177 unique malicious and unwanted files. Another popular AI tool, DeepSeek, accounted for 83 files. This large language model launched in 2025 immediately appeared on the list of impersonated tools. ' Interestingly, threat actors are rather picky in choosing an AI tool as bait. For example, no malicious files mimicking Perplexity were observed. The likelihood that an attacker will use a tool as a disguise for malware or other types of unwanted software directly depends on the service's popularity and hype around it. The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the internet. To be on the safe side, SMB employees – as well as regular users – should exercise caution when looking for software on the internet or coming across too-good-to-be-true subscription deals. Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software ', says Vasily Kolesnikov, security expert at Kaspersky. Another cybercriminal tactic to look for in 2025 is the growing use of collaboration platform brands to trick users into downloading or launching malware. The number of malicious and unwanted software files disguised as Zoom increased by nearly 13% in 2025, reaching 1,652, while such names as 'Microsoft Teams' and 'Google Drive' saw increases of 100% and 12%, respectively, with 206 and 132 cases. This pattern likely reflects the normalization of remote work and geographically distributed teams, which has made these platforms integral to business operations across industries. Among the analyzed sample, the highest number of files mimicked Zoom, accounting for nearly 41% of all unique files detected. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5%, respectively. Share of unique files with names mimicking the popular legitimate applications in 2024 and 2025 The top threats targeting small and medium businesses in 2025 included downloaders, trojans and adware. Phishing and Spam Apart from malware threats, Kaspersky continues to observe a wide range of phishing and scam schemes targeting SMBs. Attackers aim to steal login credentials for various services — from delivery platforms to banking systems — or manipulate victims into sending them money through deceptive tactics. One example is a phishing attempt targeting Google Accounts. Attackers promise potential victims to increase sales by advertising their company on X, with the ultimate goal to steal their credentials. Beyond phishing, SMBs are flooded with spam emails. Not surprisingly, AI has also made its way into the spam folder — for example, with offers for automating various business processes. In general, Kaspersky observes phishing and spam offers crafted to reflect the typical needs of small businesses, promising attractive deals on email marketing or loans, offering services such as reputation management, content creation, or lead generation, and more. Learn more about the cyber threat landscape for SMBs on Securelist. To mitigate threats targeting businesses, their owners and employees are advised to implement the following measures: Use specialized cybersecurity solutions that provide visibility and control over cloud services (e.g., Kaspersky Next). Define access rules for corporate resources such as email accounts, shared folders, and online documents. Regularly backup important data. Establish clear guidelines for using external services. Create well-defined procedures for implementing new software with the involvement of IT and other responsible managers. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

South Africa is a prime target for ransomware attacks: How to safeguard your system?
South Africa is a prime target for ransomware attacks: How to safeguard your system?

Zawya

time2 days ago

  • Zawya

South Africa is a prime target for ransomware attacks: How to safeguard your system?

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. The prevalence of these attacks is driven by a combination of factors, including the rapid digital transformation of businesses, the increasing sophistication of cybercriminals, and the economic incentives for attackers. South Africa's relatively strong economy and high levels of digital adoption make it an attractive target for ransomware operators, who know that businesses and institutions here are more likely to pay ransoms to recover critical data. Why South Africa is a hotspot for ransomware South Africa's position as a regional economic hub means that its businesses and government institutions store vast amounts of sensitive data online. Cybercriminals are well aware of this, and they exploit vulnerabilities in outdated systems, weak passwords, and human error to infiltrate networks. For instance, a healthcare provider could fall victim to a ransomware attack if its systems are not updated with the latest security patches, allowing attackers to encrypt patient records and demand a hefty ransom. Similarly, a financial institution might be targeted if employees click on a phishing email, granting attackers access to the network. Common tactics used by ransomware operators Ransomware attacks often begin with phishing emails, where attackers use social engineering to trick employees into clicking malicious links or downloading infected attachments. Once inside the network, the ransomware spreads rapidly, encrypting files and rendering them inaccessible. Attackers then demand payment in exchange for decryption keys. In some cases, they also steal sensitive data and threaten to leak it if the ransom is not paid. Another common tactic is using exploit kits, which scan systems for vulnerabilities and deploy ransomware payloads without the need for user interaction. For example, a manufacturing company could be targeted through a compromised website, where an exploit kit silently installs ransomware on its systems. The cost of ransomware attacks The financial impact of ransomware attacks can be devastating. Beyond the ransom itself, businesses face costs related to downtime, lost revenue, and reputational damage. A retail chain might lose millions of rands in sales during a ransomware-induced shutdown, while a logistics company could suffer delays in delivering goods, leading to customer dissatisfaction. Moreover, the recovery process could take weeks or months, compounding the financial losses. Prevention is key: building resilient infrastructure Businesses must adopt a proactive approach to cybersecurity to protect themselves from ransomware. This starts with regular employee training to recognise phishing attempts and other social engineering tactics. Companies should also implement robust password policies and multi-factor authentication (MFA) to reduce the risk of unauthorised access. Keeping software and systems up to date is crucial, as outdated systems are a common entry point for ransomware. Partnering with an experienced IT security provider can make a significant difference in preventing ransomware attacks. An expert partner can help businesses identify vulnerabilities, implement advanced monitoring tools, and develop a comprehensive incident response plan. For example, a small business might work with an IT partner to deploy endpoint protection software that detects and blocks ransomware before it can encrypt files. Additionally, regular backups of critical data, stored securely offsite, can ensure businesses recover quickly without paying a ransom. A multi-layered defence strategy A multi-layered approach to cybersecurity is essential for safeguarding against ransomware. This means having multiple layers of security measures in place, each one adding a different level of protection, such as firewalls, email security, and intrusion detection systems, which can be used to block attacks at the perimeter. Inside the network, businesses should use tools that monitor for suspicious activity and automatically respond to potential threats. For example, a financial institution might use machine learning algorithms to analyse network traffic and detect anomalies that could indicate a ransomware attack. While prevention is the best defence, cyber insurance can provide additional protection. Policies that cover ransomware attacks can help businesses recover financially from the costs of downtime, data recovery, and ransom payments. However, insurers are increasingly scrutinising the cybersecurity measures of their clients, meaning businesses with stronger defences might benefit from lower premiums. Ransomware attacks are a growing threat to South African businesses but are not inevitable. By investing in robust cybersecurity measures, training employees, and working with expert IT partners, businesses can significantly reduce their risk of becoming a target. Prevention is key, and a proactive approach to cybersecurity can help ensure that businesses remain resilient in this evolving threat.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store