SmartSwitch Botswana brings financial inclusion to thousands of food grant recipients
SmartSwitch Botswana is blazing a trail for financial inclusion with a financial technology (Fintech) solution that puts dignity and financial services into food voucher beneficiaries' hands. Since it was established in 2006, Smart Switch has grown its footprint to more than 75 000 beneficiaries in underserved communities across Botswana.
SmartSwitch Botswana, a subsidiary of Lesaka Technologies, was founded with the exclusive rights to deploy Botswana's Universal Electronic Payment System (UEPS). The UEPS has also been embraced and approved by the central banks of countries such as Namibia, Ghana, and South Africa as an accredited national payment system.
At the heart of the offering is a secure, biometric-enabled smart card platform designed for the unbanked and underbanked. The system enables food grant recipients to safely receive, store, and spend funds at local merchant outlets while earning interest on unspent balances.
The solution was developed in response to a Ministry of Local Government tender to overhaul Botswana's paper-based food basket system. The previous system—marked by inefficiencies, lack of choice, and social stigma—was failing the people it was meant to help.
The tender had two main goals. Firstly, the Ministry of Local Government wanted to empower beneficiaries with choice in the food they acquired, when they could collect their food, and where they could collect their food. The second aim was to provide a dignified alternative to the stigma associated with the earlier system.
'Although we applied cutting-edge technology to the challenge, we also knew we needed to create a deeply human solution to address the audience's needs,' says France Mabiletsa, Managing Director of SmartSwitch Botswana. 'We had to provide beneficiaries with choice and restore their dignity.'
Today, those goals have been exceeded. Beneficiaries no longer need to queue in the sun with wheelbarrows to collect pre-packaged goods.
Beneficiaries receive a monthly allowance on a SmartSwitch card, which they can use at over 1,200 local shops, ranging from general dealers to corner stores. Each transaction is authenticated through biometric verification, ensuring security and privacy. The card looks like a bank-issued debit card, so it isn't apparent they are food allowance beneficiaries.
In the first three years after implementation, more than 50,000 people, many of whom had never engaged with a financial institution, were integrated into Botswana's financial ecosystem. Today, over 75,000 beneficiaries have access to these smart banking tools, which include secure, offline-capable transactions via biometric-enabled POS devices
The solution is equally transformative for merchants. Payments are settled within 48 hours, improving liquidity. Competition among stores has improved service quality, benefiting end users. 'The system has helped our business grow. We serve more customers, and we get paid quickly and securely,' said Kennete Mmusinyane of Obed Supermarket in Gumare in the Okavango District.
With a track record of reliable delivery and innovation, SmartSwitch is gearing up for the next phase of its development. As the government prepares to issue a new tender, SmartSwitch has plans to introduce enhanced services and upgraded devices to further support beneficiaries and retailers.
'We're not standing still. We're reinvesting in the system to do more for more people,' says Mabiletsa. 'It is our aim to continue to be a trusted partner to the government, a reliable ally to merchants, and a gateway to dignity, choice, and empowerment for thousands of people in Botswana.' SmartSwitch is a member of Lesaka Technologies (https://LesakaTech.com/). Distributed by APO Group on behalf of Kazang.
About Kazang:
Kazang (http://www.Kazang.com/) is a leading provider of cash and digital solutions to merchants in Southern Africa's informal economies. Our fintech solutions include a diverse range of value-added services (VAS), card acquiring, secure cash vaults and supplier payments platforms. Operating with a network of approximately 90,000 active devices, we process approximately 2.2 million transactions daily in markets such as South Africa, Namibia, Botswana, and Zambia.
We are dedicated to helping small and medium merchants grow and succeed, through increasing their sales, making their businesses more efficient and reducing their risks with our holistic portfolio of products and services. Kazang is a member of Lesaka Technologies (www.LesakaTech.com/).
About Lesaka Technologies, Inc:
The Connect Group and Kazang was acquired by Lesaka Technologies, Inc. in April 2022. Lesaka Technologies, (Lesaka™) is a South African Fintech company that utilizes its proprietary banking and payment technologies to deliver superior financial services solutions to merchants (B2B) and consumers (B2C) in Southern Africa. Lesaka's mission is to drive true financial inclusion for both merchant and consumer markets through offering affordable financial services to previously underserved sectors of the economy. Lesaka offers cash management solutions, growth capital, card acquiring, bill payment technologies and value-added services to retail merchants as well as banking, lending, and insurance solutions to consumers across Southern Africa.
Lesaka has a primary listing on NASDAQ (NasdaqGS: LSAK) and a secondary listing on the Johannesburg Stock Exchange (JSE: LSK). Visit www.LesakaTech.com for additional information about Lesaka Technologies (Lesaka ™). $LSK / $LSAK
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Zawya
an hour ago
- Zawya
Eritrea: Vocational Training for Students of the College of Business and Social Science
A three-month vocational training program has been provided to 305 students, including 94 female students of the Adi-Keih College of Business and Social Science. The training aimed to enhance the students' vocational skills alongside their regular academic education. The training covered video camera operation, video editing, graphic design, computer technology, and satellite dish installation. Dr. Estifanos Hailemariam, Dean of the College, stated that the program is part of a broader effort conducted in collaboration with the National Union of Eritrean Youth and Students to nurture competent and visionary youth. Ms. Tigisti Okbai, Secretary of the Union branch at the college, stated that similar vocational training programs have been conducted in the past and will continue in the future. Mr. Meron Abraham, Head of Projects at the National Union of Eritrean Youth and Students branch for Higher Education Institutions and Sawa, encouraged the trainees to apply their acquired skills to improve their livelihoods. According to reports, since 2023, vocational training has been provided to 930 students at the Adi-Keih College of Business and Social Science. Distributed by APO Group on behalf of Ministry of Information, Eritrea.

Zawya
2 hours ago
- Zawya
Africa's $100 Billion in Remittances Poised to Catalyze Gender Equality and Local Development
As Africa attracts over $100 billion annually in remittances, and billions more in philanthropic flows, a bold new vision is emerging—one that reimagines these financial flows not as acts of charity, but as strategic capital to fuel gender equality and inclusive development. From 2 to 3 June 2025, UN Women and the Ford Foundation co-hosted a landmark Regional Conference on Sustainable Philanthropy and Remittances for Gender Equality in Dakar. Bringing together over 150 thought leaders from philanthropy, finance, government, technology, and civil society, the event examined how to align Africa's diverse funding streams with the urgent goal of empowering women and girls. From maternal health to agriculture and textile manufacturing, women-led businesses are building the backbone of African economies, yet access to capital remains a key constraint. Participants shared compelling examples of how remittances can unlock opportunity—when recognized as intentional, long-term investments rather than one-off transfers. ' This is not about aid—it's about shifting power and building systems, ' said Dr. Catherine Chi-Chi Aniagolu, Ford Foundation Regional Director for West Africa. ' We must build a new architecture of giving—one that centers African women's voices and leadership. ' Redefining Diaspora Engagement Participants stressed that it is time to rethink how we engage with the African diaspora—not just as a source of remittances but as partners in development and source of knowledge —and to redesign diaspora flows in ways that foster transformative, gender-responsive outcomes. Participants advocated for structured partnerships among diaspora networks, local civil society, and public institutions. Many called for deeper investments in movement-building and narrative change to amplify African-led and diaspora-supported initiatives. They emphasized the need for rigorous tracking of remittance impacts on women and the creation of gender-responsive investment mechanisms. ' Remittances are a quiet, perhaps surprising, success story, ' said Kofi Appenteng, President of the African American Institute. ' But any effort to scale them must stay grounded in the voices and needs of those sending and receiving—not just our theories of change. We must make African women and girls visible—not just as beneficiaries, but as architects of their own futures. ' The conference also highlighted the importance of developing the right financial products and enabling environment. Paul-Harry Aithnard, Ecobank Group Regional Director, added: ' Sending money home must go beyond consumption. With the right policies and investment products, diaspora capital can become a strategic engine for development. ' From Charity to Empowerment Foundations and financial institutions described how their funding models are evolving to embrace inclusive, feminist, and locally rooted approaches. ' When we launched the Tony Elumelu Foundation Grant in 2015, most applicants were men, ' recalled Oniye Okolo, Policy and Partnerships Officer. ' Today, 45% of our grantees are women. Our goal is to build an ecosystem where women can thrive and lead. ' ' In all our advocacy and outreach activities, we strive to put women and girls first and address the funding gap and mentorship needs of women entrepreneurs, including those in the informal sector ' said Ecobank Foundation CEO Elisa Desbordes. Financial leaders highlighted the need for policy reforms and inclusive fintech solutions to close the digital and financial divides, particularly for rural women entrepreneurs. ' When women thrive, everyone benefits. That's why our financial inclusion strategy puts women at the center—not just as beneficiaries, but as drivers of economic transformation, ' said Ms. Ndeye Amy Ngom Seck, speaking on behalf of the Central Bank of West African States. ' Reallocating even a portion of diaspora remittances toward their empowerment could be truly transformational. ' Innovation and Next Steps From maternal health to green entrepreneurship, the conference showcased how strategically aligned remittances and philanthropy can drive sustainable change. Participants proposed connecting diaspora and private capital and foundation support to grassroots women-led initiatives through digital tools, community platforms, and leverage public-private partnerships to mobilize funds. The conference ended with a resounding call to action: ' We must shift from viewing remittances and philanthropy as acts of charity to seeing them as strategic levers for inclusive, sustainable change, ' said Dr. Maxime Houinato, UN Women Regional Director for West and Central Africa. ' Let's stop designing systems around those who already have access—and start building for women who are off the grid yet hold entire families together. ' ' We too must build permanent bridges between the continent and its diaspora, ' he concluded. ' It's time to move from remittances to resilience. ' Distributed by APO Group on behalf of UN Women - Africa.


Khaleej Times
3 hours ago
- Khaleej Times
Artificial Intelligence in cybersecurity: savior or saboteur?
Artificial intelligence has rapidly emerged as both a cornerstone of innovation and a ticking time bomb in the realm of cybersecurity. Once viewed predominantly as a force for good, enabling smarter threat detection, automating incident responses, and predicting attacks before they happen — AI has now taken on a double-edged role. The very capabilities that make it invaluable to cybersecurity professionals are now being exploited by cybercriminals to launch faster, more convincing, and more damaging attacks. From phishing emails indistinguishable from real business correspondence to deepfake videos that impersonate CEOs and public figures with chilling accuracy, AI is arming attackers with tools that were previously the stuff of science fiction. And as large language models (LLMs), generative AI, and deep learning evolve, the tactics used by bad actors are becoming more scalable, precise, and difficult to detect. 'The threat landscape is fundamentally shifting,' says Sergey Lozhkin, Head of the Global Research & Analysis Team for the Middle East, Türkiye, and Africa at Kaspersky. 'From the outset, cybercriminals began using large language models to craft highly convincing phishing emails. Poor grammar and awkward phrasing — once dead giveaways are disappearing. Today's scams can perfectly mimic tone, structure, and professional language.' But the misuse doesn't stop at email. Attackers are now using AI to create fake websites, generate deceptive images, and even produce deepfake audio and video to impersonate trusted figures. In some cases, these tactics have tricked victims into transferring large sums of money or divulging sensitive data. According to Roland Daccache, Senior Manager – Sales Engineering at CrowdStrike MEA, AI is now being used across the entire attack chain. 'Generative models are fueling more convincing phishing lures, deepfake-based social engineering, and faster malware creation. For example, DPRK-nexus adversary Famous Chollima used genAI to create fake LinkedIn profiles and résumé content to infiltrate organisations as IT workers. In another case, attackers used AI-generated voice and video deepfakes to impersonate executives for high-value business email compromise (BEC) schemes.' The cybercrime community is also openly discussing how to weaponize LLMs for writing exploits, shell commands, and malware scripts on dark web forums, further lowering the barrier of entry for would-be hackers. This democratisation of hacking tools means that even novice cybercriminals can now orchestrate sophisticated attacks with minimal effort. Ronghui Gu, Co-Founder of CertiK, a leading blockchain cybersecurity firm, highlights how AI is empowering attackers to scale and personalize their strategies. 'AI-generated phishing that mirrors human tone, deepfake technology for social engineering, and adaptive tools that bypass detection are allowing even low-skill threat actors to act with precision. For advanced groups, AI brings greater automation and effectiveness.' On the technical front, Janne Hirvimies, Chief Technology Officer of QuantumGate, notes a growing use of AI in reconnaissance and brute-force tactics. 'Threat actors use AI to automate phishing, conduct rapid data scraping, and craft malware that adapts in real time. Techniques like reinforcement learning are being explored for lateral movement and exploit optimisation, making attacks faster and more adaptive.' Fortifying Cyber Defenses To outsmart AI-enabled attackers, enterprises must embed AI not just as a support mechanism, but as a central system in their cybersecurity strategy. 'AI has been a core part of our operations for over two decades,' says Lozhkin. 'Without it, security operations center (SOC) analysts can be overwhelmed by alert fatigue and miss critical threats.' Kaspersky's approach focuses on AI-powered alert triage and prioritisation through advanced machine learning, which filters noise and surfaces the most pressing threats. 'It's not just about automation — it's about augmentation,' Lozhkin explains. 'Our AI Technology Research Centre ensures we pair this power with human oversight. That combination of cutting-edge analytics and skilled professionals enables us to detect over 450,000 malicious objects every day.' But the AI evolution doesn't stop at smarter alerts. According to Daccache, the next frontier is agentic AI — a system that can autonomously detect, analyze, and respond to threats in real time. 'Traditional automation tools can only go so far,' Daccache says. 'What's needed is AI that thinks and acts — what we call agentic capabilities. This transforms AI from a passive observer into a frontline responder.' CrowdStrike's Charlotte AI, integrated within its Falcon platform, embodies this vision. It understands security telemetry in context, prioritises critical incidents, and initiates immediate countermeasures, reducing analyst workload and eliminating delays during high-stakes incidents. 'That's what gives defenders the speed and consistency needed to combat fast-moving, AI-enabled threats,' Daccache adds. Gu believes AI's strength lies in its ability to analyze massive volumes of data and identify nuanced threat patterns that traditional tools overlook. 'AI-powered threat detection doesn't replace human decision-making — it amplifies it,' Gu explains. 'With intelligent triage and dynamic anomaly detection, AI reduces response time and makes threat detection more proactive.' He also stresses the importance of training AI models on real-world, diverse datasets to ensure adaptability. 'The threat landscape is not static. Your AI defenses shouldn't be either,' Gu adds. At the core of any robust AI integration strategy lies data — lots of it. Hirvimies advocates for deploying machine learning models across SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms. 'These systems can correlate real-time threat intelligence, behavioral anomalies, and system events to deliver faster, more precise responses,' he says. 'Especially when it comes to detecting novel or stealthy attack patterns, machine learning makes the difference between catching a threat and becoming a headline.' Balancing Innovation with Integrity While AI can supercharge threat detection, response times, and threat simulations, it also brings with it the potential for misuse, collateral damage, and the erosion of privacy. 'Ethical AI use demands transparency, clear boundaries, and responsible data handling,' says Lozhkin.'Organisations must also ensure that employees are properly trained in the safe use of AI tools to avoid misuse or unintended exposure to threats.' He highlights Kaspersky's Automated Security Awareness Platform, which now includes dedicated sections on AI-assisted threats and responsible usage, reflecting the company's commitment to proactive education. When AI is deployed in red teaming or simulated cyberattacks, the risk matrix expands. Gu warns that AI systems, if left unchecked, can make decisions devoid of human context, potentially leading to unintended and widespread consequences. 'Ethical AI governance, robust testing environments, and clearly defined boundaries are essential,' he says, underlining the delicate balance required to simulate threats without crossing into unethical territory. Daccache emphasises the importance of a privacy-first, security-first approach. 'AI must be developed and operated with Privacy-by-Design and Secure-by-Design principles,' he explains. 'This extends to protecting the AI systems themselves — including their training data, operational logic, and outputs—from adversarial manipulation.' Daccache also points to the need for securing both AI-generated queries and outputs, especially in sensitive operations like red teaming. Without such safeguards, there's a real danger of data leakage or misuse. 'Transparency, accountability, and documentation of AI's capabilities and limitations are vital, not just to build trust, but to meet regulatory and ethical standards,' he adds. Despite AI's growing autonomy, human oversight remains non-negotiable. 'While AI can accelerate simulations and threat detection, it must be guided by skilled professionals who can interpret its actions with context and responsibility,' says Daccache. This human-AI collaboration ensures that the tools remain aligned with organisational values and ethical norms. Hirvimies rounds out the conversation with additional cautionary notes: 'Privacy violations, data misuse, bias in training datasets, and the misuse of offensive tools are pressing concerns. Transparent governance and strict ethical guidelines aren't optional, they're essential.' Balancing the Equation While AI promises speed, scale, and smarter defense mechanisms, experts caution that an over-reliance on these systems, especially when deployed without proper calibration and oversight — could expose organisations to new forms of risk. 'Absolutely, over-reliance on AI can backfire if systems are not properly calibrated or monitored,' says Lozhkin. 'Adversarial attacks where threat actors feed manipulated data to mislead AI are a growing concern. Additionally, AI can generate false positives, which can overwhelm security teams and lead to alert fatigue. To avoid this, companies should use a layered defence strategy, retrain models frequently, and maintain human oversight to validate AI-driven alerts and decisions.' This warning resonates across the cybersecurity landscape. Daccache echoes the concern, emphasising the need for transparency and control. 'Over-relying on AI, especially when treated as a black box, carries real risks. Adversaries are already targeting AI systems — from poisoning training data to crafting inputs that exploit model blind spots,' he explains. 'Without the right guardrails, AI can produce false positives or inconsistent decisions that erode trust and delay response.' Daccache stresses that AI must remain a tool that complements — not replaces—human decision-making. 'AI should be an extension of human judgement. That requires transparency, control, and context at every layer of deployment. High-quality data is essential, but so is ensuring outcomes are explainable, repeatable and operationally sound,' he says. 'Organisations should adopt AI systems that accelerate outcomes and are verifiable, auditable and secure by design.' Gu adds that blind spots in AI models can lead to serious lapses. 'AI systems are not infallible,' he says. 'Over-reliance can lead to susceptibility to adversarial inputs or overwhelming volumes of false positives that strain human analysts. To mitigate this, organizations should adopt a human-in-the-loop approach, combine AI insights with contextual human judgment, and routinely stress-test models against adversarial tactics.' Gu also warns about the evolving tactics of bad actors. 'An AI provider might block certain prompts to prevent misuse, but attackers are constantly finding clever ways to circumvent these restrictions. This makes human intervention all the more important in companies' mitigation strategies.' Governing the Double-Edged Sword As AI continues to embed itself deeper into global digital infrastructure, the question of governance looms large: will we soon see regulations or international frameworks guiding how AI is used in both cyber defense and offense? Lozhkin underscores the urgency of proactive regulation. 'Yes, there should definitely be an international framework. AI technologies offer incredible efficiency and progress, but like any innovation, they carry their fair share of risks,' he says. 'At Kaspersky, we believe new technologies should be embraced, not feared. The key is to fully understand their threats and build strong, proactive security solutions that address those risks while enabling safe and responsible innovation.' For Daccache, the focus is not just on speculative regulation, but on instilling foundational principles in AI systems from the start. 'As AI becomes more embedded in cybersecurity and digital infrastructure, questions around governance, risk, and accountability are drawing increased attention,' he explains. 'Frameworks like the GDPR already mandate technology-neutral protections, meaning what matters most is how organizations manage risk not whether AI is used.' Daccache emphasises that embedding Privacy-by-Design and Secure-by-Design into AI development is paramount. 'To support this approach, CrowdStrike offers AI Red Teaming Services, helping organisations proactively test and secure their AI systems against misuse and adversarial threats. It's one example of how we're enabling customers to adopt AI with confidence and a security-first mindset.' On the other hand, Gu highlights how AI is not only transforming defensive mechanisms but is also fuelling new forms of offensive capabilities. 'As AI becomes integral to both defence and offense in cyberspace, regulatory frameworks will be necessary to establish norms, ensure transparency, and prevent misuse. We expect to see both national guidelines and international cooperation similar to existing cybercrime treaties emerge to govern AI applications, particularly in areas involving privacy, surveillance, and offensive capabilities.' Echoing this sentiment, Hirvimies concludes by saying that developments are already underway. 'Yes. Regulations like the EU AI Act and global cyber norms are evolving to address dual-use AI,' he says. 'We can expect more international frameworks focused on responsible AI use in cyber defence, limits on offensive AI capabilities, and cross-border incident response cooperation. At QuantumGate, we've designed our products to support this shift and facilitate compliance with the country's cryptography regulations.'