Vodacom Business enhances cyber resilience

Issue 5 2020 Information Security

The global cybercrime pandemic triggered by COVID-19 may be here to stay, making it critical for businesses to ensure they are protected. News reports of the recent local attack on a critical healthcare organisation earlier this month indicates that South African businesses are not exempt, with South Africa seeing a 33% increase in the volume of cyber-attacks since March.

To continue to support and protect customers, Vodacom Business has partnered with Cloudflare to provide businesses of all sizes, faster, more secure and reliable website services.

Fast becoming a common type of cyberattack is a Distributed Denial-of-Service (DDoS) attack. DDoS attacks target websites and online services with the goal of overwhelming them with more traffic than the server or network can accommodate. This ultimately renders the website or service inoperable, leading to revenue loss, operational expenses and more importantly damage to a company’s brand.

Digital businesses depend on constant, uninterrupted connectivity. Network and web services availability is crucial to ensuring customer satisfaction, trust and confidence in a brand or business. With new attacks varying in size, duration and persistence, DDoS protection has become an essential part of every business and organisation’s online presence.

“As a leading supplier of telecommunications, infrastructure and enterprise software in South Africa, Vodacom Business’s partnership with Cloudflare ensures that our customers have the best products and solutions available to protect them from today’s increasingly sophisticated online threats,” says Kabelo Makwane, managing executive for Cloud, Hosting and Security at Vodacom Business. “Now is not the time to let your guard down. With some businesses going back to their offices but many others still operating via remote working, cyber criminals are gearing up to further attack businesses as they adopt a hybrid model between their corporate network and remote set up.”

Cloudflare offers a diverse set of security, performance, and reliability products that use machine learning to provide actionable and timely insights that help secure and accelerate websites and other Internet properties. These include:

• Proactively defending against cyberattacks.

• Providing insights from traffic to a single Internet property that can be applied across Cloudflare’s entire global network to quickly prevent potential cyberattacks.

• Blocking malicious traffic by classifying bad traffic using the source IP.

• Improving performance by routing traffic intelligently.

• Automatic updates to WAF for protecting against new application attacks.

The partnership with Cloudflare will allow Vodacom Business to offer DDoS protection and traffic acceleration for all network infrastructure — whether on-premise, cloud-hosted, or in a hybrid environment. Now more than ever, business networks need to remain secure, fast, and reliable. Cloudflare’s network offers the scale and performance that helps organisations deliver a superior application experience while keeping their environments secure. 

“This solution is vital for Internet applications such as websites that collect users’ personal details and require additional security and can be applied by financial institutions, hospitals and any other businesses to ensure their customers’ personal information remains secure,” says Makwane.

No business is exempt from the many risks of cybercrimes, including financial loss, disruption in operations and damage to the business reputation. Vodacom Business continues to provide security products and services to businesses of all sizes, leveraging skilled resources and cutting-edge technology to secure IT systems and networks.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.