From the editor's desk: In the cyber trenches

Smart Cybersecurity Handbook 2022 News

Andrew Seldon.

Welcome to the first Smart Cybersecurity Handbook published by Hi-Tech Security Solutions. The information and data security fields are not new ground for us, but given the growth in cyber risks from every quarter, which some have described as a pandemic, we decided to create an annual handbook and email news briefs dedicated to cybersecurity – apart from the cybersecurity category on

It’s probably the worst time to get into a new venture like this in the current economy, but it is also the best time as the Covid pandemic has been a great time for cyber criminals. While these gangs seem to get better at what they do all the time, the end users, whether organisations or individuals, seem to be left more and more in the dark about what to do to protect themselves. This is especially true in a world where even the poor can’t seem to survive without their cellphones with the latest apps installed.

This handbook is meant to be a starting point. It may seem strange to offer a ‘starting point’ after so much has happened and cyber risks are so dangerous and diverse, but when you get the basics right, it’s easier to build on what you have.

And while there are many solutions out there offering protection to one or more aspects of your cyber environment, there is no silver bullet to solve the problem, especially when ransomware is thrown into the mix; ransomware can get you via a seemingly legitimate email, or via more complex hacking.

Far from being a grudge purchase, which security in all its forms seems to be – from the immobiliser in your car, the alarm protecting your house, or the complex set of applications securing your organisation – today’s security offering is not only a cost centre focused on protection, but its goal is business continuity and ensuring the spice flows. (For those not getting the Dune symbolism, spice is data, which is money.)

Good cybersecurity, actually good security in all its forms, allows the business to function smoothly, and as we will explore in the near future, the same systems and data can be of even more use in assisting in business optimisation.

And we haven’t even mentioned AI, until now. Artificial intelligence is also impacting the cyber industry on both sides, increasing risks while also helping to reduce them. Keep tuned in to and look out for the next Smart Cybersecurity Handbook as we delve further into what some (totally not conspiracy theorists) consider to be the opening shots of World War III.

Your comments and criticisms of the handbook, including areas you feel we need to cover, are welcome. Send them to me at


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Obituary: Steven James Meyer
January 1957 - January 2022

Technews Publishing News
It is with deep sadness and shock that we announce the sudden death of SA Instrumentation & Control Editor, Steven Meyer. Steven joined Technews in October 2007 in the position of Deputy Editor. His ...

The worst of times
Technews Publishing Editor's Choice
Cyber resilience in terms of people, processes and technology is where it’s at when it comes to prevailing in a world beset with cybercriminals.

Providing real-time visibility
Technews Publishing Editor's Choice
Comprehensive visibility is critical, but not always attainable without the support of a managed service provider dedicated to monitoring and securing your cyber environment around the clock.

Getting the basics right
Technews Publishing Editor's Choice
Cybersecurity is like any other discipline, you can’t start at the top, you need to get the basics right. Hi-Tech Security Solutions asks how to best do this.

Ransomware doesn’t take holidays
Technews Publishing Cyber Security
Cybereason has published a global study of 1200+ security professionals at organisations that have previously suffered a successful ransomware attack on a holiday or weekend, titled Organizations at risk: Ransomware attackers don’t take holidays.

Industrial control systems threat medley
According to Kaspersky ICS CERT report, almost one in three industrial computers globally was subject to malicious activity in the first half of 2021.

Social media censorship annual report
Africa is the most censorship-intensive region in the world when it comes to social media, with 10 countries shutting down social media this year.

Turnstar ramps up countermeasures
Turnstar Systems Editor's Choice Access Control & Identity Management News Products
Turnstar has developed and patented an early warning and deterrent system which will alert security, and anyone nearby, of any attempt to place ramps over the raised spikes.

Offshore cloud video surveillance system
Eagle Eye Networks CCTV, Surveillance & Remote Monitoring News Transport (Industry)
Eagle Eye Networks and TechBinder collaborate on offshore cloud video surveillance system for maritime sector, bringing real-time remote viewing and notifications to enhance vessel performance data and reporting

Suprema integrates biometric access control with Genetec
Suprema News CCTV, Surveillance & Remote Monitoring Access Control & Identity Management
Suprema has announced the successful integration of its biometric access control products with Genetec Security Center, a unified security platform that connects security systems, sensors and data in a single intuitive interface.