XML 36 R9.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management Strategy And Governance [Line Items]  
Cybersecurity Risk Management Processes For Assessing Identifying And Managing Threats [Text Block]
We operate
 
in the Southern African
 
Fintech industry,
 
which is subject to various
 
cybersecurity risks that could
 
adversely affect
our business, financial condition,
 
and results of
 
operations including, but not
 
limited to, the
 
following: intellectual property theft,
 
fraud,
extortion, harm to employees or customers, violation of privacy laws and other litigation and legal risk and reputational risk.
We have
implemented
 
a
 
risk-based
 
approach
 
to
 
identify
 
and
 
assess the
 
cybersecurity
 
threats that
 
could
 
affect
 
our
 
business and
 
information
systems. Our cybersecurity program is aligned with
 
industry standards and best practices, specifically the
 
Payment Card Industry Data
Security Standard
 
(“PCI DSS”),
 
the National
 
Institute of
 
Standards and
 
Technology
 
(“NIST”) Cybersecurity
 
Framework and
 
more
recently
 
the SARB
 
Directive
 
No. 01
 
of 2024,
 
focusing
 
on cybersecurity
 
and cyber-resilience
 
within the
 
National
 
Payment System
(“NPS”).
 
We periodically
 
conduct a
third
-party Security Risk Assessment
 
(“SRA”) to
identify
 
the potential impact and
 
likelihood of
various
 
cyber
 
scenarios
 
and
 
to
 
determine
 
the
 
appropriate
 
mitigation
 
strategies
 
and
 
controls.
 
We
 
also
 
use
 
this
 
SRA
 
to
 
inform
 
our
cybersecurity roadmap and strategies to ensure a robust
 
IT security environment is implemented at
 
our company. We use various tools
and
 
methodologies
 
to
 
manage
 
cybersecurity
 
risk—including,
 
but
 
not
 
limited
 
to,
 
the
 
following:
 
the
 
use
 
of
 
a
 
Managed
 
Endpoint
Detection and Response
 
(“EDR”) software and
 
Managed Network
 
Detection and Response
 
(“MNDR”) for
 
our Local Area
 
Network
(“LAN”)
 
monitoring
 
with
 
internal
 
and
 
external
 
Security
 
Operations
 
Center
 
(“SOC”)
 
real-time
 
monitoring,
 
Data
 
Loss
 
Prevention
(“DLP”) enabled
 
across email and
 
web channels as
 
well as mandatory
 
Multi-factor Authentication
 
(“MFA”)
 
in our IT
 
environment.
In addition, we do periodic backups and regularly test the process to recover any lost or corrupted data. We
 
also monitor and evaluate
our
 
cybersecurity
 
posture
 
and
 
performance
 
on
 
an
 
ongoing
 
basis
 
through
 
regular
 
vulnerability
 
scans,
 
penetration
 
tests,
 
and
 
threat
intelligence
 
feeds
 
provided
 
by
 
our
 
respective
 
security
 
vendors.
 
We
 
require
 
third-party
 
service
 
providers
 
with
 
access
 
to
 
personal,
confidential or proprietary
 
information to implement
 
and maintain comprehensive
 
cybersecurity practices consistent
 
with applicable
legal standards and industry best practices.
Cybersecurity Risk Management Processes Integrated Flag true
Cybersecurity Risk Management Processes Integrated [Text Block]
We have
implemented
 
a
 
risk-based
 
approach
 
to
 
identify
 
and
 
assess the
 
cybersecurity
 
threats that
 
could
 
affect
 
our
 
business and
 
information
systems. Our cybersecurity program is aligned with
 
industry standards and best practices, specifically the
 
Payment Card Industry Data
Security Standard
 
(“PCI DSS”),
 
the National
 
Institute of
 
Standards and
 
Technology
 
(“NIST”) Cybersecurity
 
Framework and
 
more
recently
 
the SARB
 
Directive
 
No. 01
 
of 2024,
 
focusing
 
on cybersecurity
 
and cyber-resilience
 
within the
 
National
 
Payment System
(“NPS”).
Cybersecurity Risk Management Third Party Engaged Flag true
Cybersecurity Risk Third Party Oversight And Identification Processes Flag true
Cybersecurity Risk Materially Affected Or Reasonably Likely To Materially Affect Registrant Flag false
Cybersecurity Risk Materially Affected Or Reasonably Likely To Materially Affect Registrant [Text Block]
As of
 
the date
 
of this
 
Annual Report,
 
we
 
do
not
 
believe
 
any risks
 
from
 
cybersecurity
 
threats have
 
materially
 
affected
 
or are
reasonably
 
likely to
 
materially affect
 
us, including
 
our results
 
of operations
 
or financial
 
condition.
Cybersecurity Risk Board Of Directors Oversight [Text Block]
Our Board of Directors exercises its oversight role through the Audit Committee
,
which provides the Board with regular reports
and findings
 
from our
Group
Chief Information Security Officer
 
(“
CISO
”)
, a
qualified cybersecurity professional
 
with over 25 years
of experience and a Master’s in Information Security from
 
Royal Holloway, University of London
.
Cybersecurity Risk Board Committee Or Subcommittee Responsible For Oversight [Text Block]
Our Board of Directors exercises its oversight role through the Audit Committee
Cybersecurity Risk Process For Informing Board Committee Or Subcommittee Responsible For Oversight [Text Block]
which provides the Board with regular reports
and findings
 
from our
Group
Chief Information Security Officer
 
(“
CISO
”)
Cybersecurity Risk Role Of Management [Text Block]
We
 
recognize
 
the importance
 
of cyber
 
security
 
awareness and
 
skills development
 
which is
 
regularly
 
provided
 
to the
 
general
workforce, security
 
teams, developers
 
and senior
 
management which
 
includes regular
 
crisis simulations to
 
prepare respective
 
teams
for crisis scenarios. This also includes regular phishing simulations and campaigns.
Cybersecurity Risk Management Positions Or Committees Responsible Flag true
Cybersecurity Risk Management Positions Or Committees Responsible [Text Block]
Chief Information Security Officer
Cybersecurity Risk Management Expertise Of Management Responsible [Text Block]
qualified cybersecurity professional
 
with over 25 years
of experience and a Master’s in Information Security from
 
Royal Holloway, University of London
Cybersecurity Risk Process For Informing Management Or Committees Responsible [Text Block]
which provides the Board with regular reports
and findings
Cybersecurity Risk Management Positions Or Committees Responsible Report To Board Flag true