Cyber defence in an era of digital dependency

Issue 9 2020 Information Security

One of the most significant implications of the COVID-19 pandemic is the global shift to dependency on the digital economy. Constellated workplaces have opened up technological risks such as unsecured devices, shadow IT and unregulated Internet access, and opportunistic fraudsters have launched unprecedented cyber warfare on poorly defended systems. In the face of heightened pressure on digital infrastructure, what can companies do to defend themselves in a new era of cyber risk?

Businesses across the globe have typically taken an immature approach to cybersecurity, believing that a firewall is an adequate fortress to defend their intellectual property. According to Nithen Naidoo, CEO of Snode, there is an urgent need – now more than ever – for always-on surveillance and real-time risk analysis for potential breaches. “Cybercriminals are deploying a varied arsenal of insidious tactics to access your company’s information technology: coronavirus-specific phishing schemes, malware, memetics, deepfakes and mass cognitive influence operations. In this new normal, organisations must aggressively confront these potential risks. Fundamental to the success of security efforts is launching cyber defence solutions that are impactful, agile and quick to adopt. Failure to do so could be catastrophic.”

Business continuity is the key modus operandi in these precarious times. Cybersecurity efforts need to be upgraded – and quickly – to defend the digital infrastructure that is integral to a company’s success. As such, it is imperative that South Africa has access to locally developed cyber-defence technology that accounts for our unique requirements through a secure, trusted technology supply chain.

“At Snode, we focus on digital defence innovation with in-house developed technology and home-grown talent. Cybersecurity must be approached as far more than just a checkbox exercise; the newfound fragility of information technology systems means that organisations must go the extra mile to not only remain resilient and secure, but to successfully springboard into the digital landscape of the future. Our central premise is built on the need to mature the cybersecurity posture of our businesses,” says Naidoo.

With data security top-of-mind for companies and governments alike, the United States has taken steps to emulate the ‘Great Firewall of China’ by restricting access to apps such as TikTok and WeChat due to privacy concerns. While an isolated American information network does create more insular data defence for its citizens, it can be postulated that putting limitations on the Internet of Things defeats its intrinsic purpose: Internet freedom and interconnectedness wherever you are in the globe.

In this new era of cyber defence, it is integral that business leaders and governments adopt a forward-thinking approach towards integrating cybersecurity into their business operating model. Central to this is to invest in robust cyber solutions to anticipate, combat and refine their approach to adverse business conditions, vulnerabilities and threats as a result of the world’s heightened online footprint. “Companies should be looking beyond the short-term implications of operating in cyberspace due to the COVID-19 pandemic, and gear themselves towards a sustainable defence strategy to ensure organisational success during the Fourth Industrial Revolution,” concludes Naidoo.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.