Approaching security differently

Issue 9 2020 Integrated Solutions

With worldwide cybersecurity spending expected to approach $42 billion by the end of this year, businesses are increasingly turning their attention to solutions that feature integrated protection. The proliferation of multi-cloud environments and shadow IT systems is further driving the need to orchestrate, manage, and create security visibility without losing agility and speed.


Karl Fischer.

In South Africa, June this year sees the implementation of the Protection of Personal Information Act (POPIA), which further complicates the cybersecurity landscape especially how it relates to sensitive customer data. Many companies are simply following a tick-box approach to compliance, but the financial and reputational damage that a breach creates means a more focused strategy is required.

Even though cybersecurity has been an element of IT systems for decades, companies who still view it as a bolt-on component will never be effective at preventing attacks. The focus must now turn to working with vendors capable of testing, automating, and building roadmaps and supporting tools for observability of compliance for organisations. By embracing cybersecurity as an element of compliance, integrating it into all aspects of business empowers organisations to monitor whether they are meeting their fiduciary responsibilities.

Complete view

The lockdown has forced companies to start thinking differently about their cybersecurity. Regardless of where employees are based, the systems must be in place to protect all entry points in such a digitally-driven corporate environment.

With people returning to the office, the security landscape shifts to include hygienic practices as well. The risks that workers face at the office is whether their desks are clean, or a sensitive document is removed from the office printer instead of being left in the out tray for anybody to take. Furthermore, from a compliance perspective, the physical documents that have been kept for the mandatory seven years will require on-site shredding. While these activities might seem trivial, not adhering to them could result in similar financial and reputational damage as a cyber breach.

Looking to the future

With thoughts already turning to the rest of the year, security discussions will certainly be easier to have thanks to the digital transformation brought about by the COVID-19 pandemic. The office of the future will look significantly different to the environment earlier this year. Remote working will become part of the status quo and integrated security will be even more critical to protect employees regardless of where they access the corporate network from.

If the lockdown has shown corporates anything then it is the importance of continually reviewing their security policies. Being compliant must therefore not be considered a necessary chore. Instead, it must be viewed as a vital component of any digital transformation project. It enables the organisation to safely adapt to innovative technology opportunities while safeguarding sensitive information and data.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...