MTN MoMo Launches Additional Services To Help SA During Challenging Times

MTN’s Mobile Money solution, MoMo, has launched some new functionalities aimed at assisting South Africans during challenging economic times. These include the new food...

Latest Posts

SA’s Digital Heritage: Keeping Us Globally Relevant

South Africa’s heritage is not just physical. It is intimately part of the digital world. Digital connectively can enhance the value of that heritage,...

How is Huawei Powering Digital Inclusion with Technology in Africa?

Huawei believes that no one should be left behind in the digital world, so the Chinese telecoms giant developed TECH4ALL. TECH4ALL is a long-term, digital...

Uber Eats Releases South Africa’s Most Loved Traditional Orders

The term local is lekker always rings true in a country as diverse as South Africa, where one is always guaranteed a taste extravaganza....

2021 BMW M3 Competition Sedan and M4 Competition Coupe Revealed

BMW has finally revealed its new M3 and M4 Coupe models that are likely to launch locally towards the middle of 2021. South Africans are...

Stolen Identities Cause Another Headache for South Africa

South Africans now have another crisis to worry about, their personal information has been lost to a fraudster who has gained access to 24 million people’s information. The information in question is the exact detail required to access banking information, access accounts and steal identities.

Cybersecurity expert and J2 Software CEO John Mc Loughlin says the exact end game is not clear, but the possibilities are endless.

“The initial hype around Experian mentioned they had been hacked and data was stolen. With additional detail it seems that none of the systems were breached and the personal information of 24 million South Africans was lost due to an internal failure.”

This is a prime example of an insider threat causing a massive loss. A business like Experian deals in data, therefore losing this data is losing their competitive advantage. Unfortunately at this point in South Africa the only ones who are lined up to lose anything are the citizens and businesses who’s data has been lost due to Experian’s failure to protect it.

“South Africa is not immune to attack and we are often reported among the most attacked countries in the world. Recent breaches at a Momentum subsidiary, the data compromised at a Nedbank service provider, Liberty’s loss of email records and the Master Deeds breach of a few years ago shows us that nothing and nobody is immune,” he explains.

These attacks are not only aimed at large businesses but every business is a target. Often the attackers will target smaller businesses because they normally do not have the necessary security controls in place. These smaller service providers are the stepping stone to their customers and the SME is used as the bait in the ultimate goal of catching a far bigger fish.

Mc Loughlin says companies are simply not doing enough to combat the insider threat.

“The insider threat clearly does not mean only the rogue employee in the organisation, in pretty much every successful cyberattack the insider is the reason but they are not always at fault.”

“South African businesses are not investing In tools to combat the insider threat by ensuring visibility of the activity at the end point and deploying a comprehensive and engaging user awareness program while rigorously reminding the relevant insiders on the correct processes and controls to ensure data security,” he adds.

Most breaches can be prevented with the right visibility and this will help you identify malicious users, negligent users and compromised accounts. Monitoring for compliance is more critical now than it has ever been.

Taking advantage of telemetry from data, machines, applications and people allows business leaders to gain valuable insights into where they should focus their efforts to prevent data loss. The network no longer exists, it is wherever the user is. Single actions will not give one context, businesses need to gain visibility in order to quickly identify indicators of intent.

Mc Loughlin says a layered cybersecurity program is non-negotiable in the modern world and if your security approach continues to be the network and perimeter, you are going to be the next breaking news story.

“Adopting a user-centric approach to cybersecurity allows you to protect the most important asset in the business, your information.”

“Visibility gives you the capability to detect and the ability to rapidly respond. The time to talk about cyber threats is over for South African businesses of all sizes, you have all been talking for too long. Start taking action,” he concludes.

 

Latest Posts

SA’s Digital Heritage: Keeping Us Globally Relevant

South Africa’s heritage is not just physical. It is intimately part of the digital world. Digital connectively can enhance the value of that heritage,...

How is Huawei Powering Digital Inclusion with Technology in Africa?

Huawei believes that no one should be left behind in the digital world, so the Chinese telecoms giant developed TECH4ALL. TECH4ALL is a long-term, digital...

Uber Eats Releases South Africa’s Most Loved Traditional Orders

The term local is lekker always rings true in a country as diverse as South Africa, where one is always guaranteed a taste extravaganza....

2021 BMW M3 Competition Sedan and M4 Competition Coupe Revealed

BMW has finally revealed its new M3 and M4 Coupe models that are likely to launch locally towards the middle of 2021. South Africans are...

Don't Miss

Avon Disrupts the Norms to Create Addictive, Rebellious & Fierce “Far Away Rebel & Diva”

Avon breaks all the rules with Far Away Rebel & Diva. The new launch is the next step in the glamorous bold journey of...

Investec Says Union Must Seek Answers For Phantom Shares from Cell C

Investec has told the Information Communication Technology Union (ICTU) to direct its questions about the Believe Phantom Option Share Scheme for Cell C workers to the...

Union Asks If Blue Label Telecoms Is Using Cell C as a ‘Piggy Bank’

The Information Communication Technology Union (ICTU) wants Blue Label Telecoms to explain how the JSE-listed company can zero rate its stake in Cell C...

Workers at Cell C Want Investec to Explain ‘Sudden Devaluing’ of their Share Scheme

The Information Communication Technology Union (ICTU) has asked Investec to explain the ‘devaluing’ of the "Believe Phantom Option Shares Scheme (Believe Share Scheme)" awarded to Cell...

Spotify’s Discover Weekly Playlists Now Sponsored by Telkom South Africa

Global streaming service Spotify is announcing Telkom South Africa as the first local sponsor of the Discover Weekly playlists for South African users. These sponsorship...

Stay in touch

To be updated with all the latest news, offers and special announcements.