Securing your estate’s technology

Residential Security Handbook 2022: SMART Estate Living Editor's Choice, Information Security, Residential Estate (Industry)

Cybersecurity is one of those topics that has been in the media and in almost every print and online publication, even in verticals that have nothing to do with cybersecurity, for years. Today it’s one of those topics that we gloss over or perhaps don’t even see unless the headline is catchy or mentions a company we know.

Another reason for this ‘boredom’ with cybersecurity is that the so-called solutions always seem to be the same, but the breaches and problems never go away. There is always another major company losing large sums of money and millions of personal details and these are mainly in the US or EU because the law compels these companies to spill the beans. In Africa there is no telling how much of our personal information has been lost as it is only recently that companies have been required to admit a breach. At the same time, we know how important following the law is in this country and we know how law enforcement struggles to keep up.

One individual in the cybersecurity industry told this writer that unless you have lost over R10 million, preferably more, there are simply no resources and no motivation for the SAPS to do an investigation. I leave it to the reader to judge the merits of this statement.

Residential estates would be very careless to think they are not a target for cyber-attacks. The large estates are believed to be flush with money, plus they hold the personal details of some wealthy people criminals would love to find out more about – like their address, habits, bank account numbers and so on.

Estates also at risk

And while cybersecurity is complex and beyond the scope of most people, even those in IT, it is not impossible to secure your estate or organisation to the level where it’s more trouble than it’s worth to break in. And these defences, although extremely complex at the core, are not all that complex to implement. The Verizon 2021 Data Breach Security Report states that 85% of successful cyber breaches now involve a human element, a critical factor to consider.


Roy Alves.

Roy Alves, national sales manager at J2 Software, explains that irrespective the size of the business, email is the primary business communications platform today and it is therefore also the primary attack vector for cybercriminals wanting to get into your systems.

If you think about it, if someone has access to your email, they have access to your whole organisation and can send internal emails with malware or phishing attachments – which most of us would not think twice about trusting since they come from inside the company. This email danger is even more risky when the people using corporate email systems are not educated as to the potential threats.

To and from your supply chain

An attack vector that is becoming riskier by the day is the supply chain, adds Alves. Estates have many suppliers and if one of them is compromised, they can then spoof emails to estate personnel to tell the accounts department to change the bank details of a supplier or send fake invoices with all the required purchase order numbers etc. The opposite can also happen. If the estate is compromised its suppliers and residents are open to attack from a supposedly legitimate address.

And the criminals have advanced beyond simple email too. These days they call their victims and persuade them to provide sensitive information, such as bank OTPs etc. This is not a call from someone with a foreign accent, but a local accent who already knows things about the estate, like the name of the HOA chair etc. Combining a call from your ‘supplier’ with an email from the same company is a common trick; the caller will tell the victim they just sent an email, which looks legitimate and ask them to open the PDF file – and they’re in.

Playing by the rules

Another email trick is to change the rules your email software executes whenever an email arrives. Nobody bothers to check if their rules are in order and only contain those rules set by the user – most don’t know where to check since many applications make it easy to set up rules.

An intruder may set up a rule that forwards any emails with the word ‘invoice’ in the subject or body to another email address which allows them to get copies of all your suppliers and their invoices, or even invoices sent to residents. This information may not provide an immediate profit, but it provides useful information that can be used in further attacks or phishing attempts.

Targeted attacks

While you may consider yourself and your estate well protected, social media is a great tool for criminals. LinkedIn, for example, allows us to boast of our position as estate manager at Estate A, or HOA chair at Estate B. It also allows us to provide a full history of employment and education. Other platforms have pictures and information of you and your family. And the list goes on.

Alves explains that cybercriminals today are less inclined to work on a ‘spray-and-pray’ basis where they send spam to every email address they can steal, but spend time collecting information targeting people and organisations where they know there are rich pickings. An estate may simply be a step in getting into wealthy residents’ bank accounts.

The more the criminals collect about you, the better they can target you. They are also clever and would probably send a phishing email late in the afternoon when people are tired, or send one late in the afternoon at the end of the month when the accounts department is at its busiest.

Standard protection

Alves says it is critical that estates (any organisation for that matter) protect their ‘post office’ to ensure that malicious emails don’t even get to the user. Even then, some can still get through, which means that users need to be educated and aware. He also recommends moving away from POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) as these are old and vulnerable (although reliable) email protocols.

He also suggests using multi-factor authentication (MFA), like the one-time PINs (OTPs) banks often use. This requires a second input before you can log into an email or accounting package. An MFA doesn’t have to be via SMS, but can be easily installed and used via an app like Google Authenticator (and many other options, like biometrics), which requires authentication every time you log in.

And while it is less convenient to spend a few seconds using MFA, it makes your systems more secure. Even if only some people use MFA, access to important accounts, servers and accounting packages, for example, should be protected. And of course, using complex passwords should also be compulsory.

For those who have a clever password which they use on all their accounts, Alves warns that criminals can scan the dark web and find lists of users’ information from breaches in the past, check their password and try to see if it works again in their current environment. Many of us use different passwords, but create them in a similar format, changing certain dates or letters depending on which account we are using. Scanning breaches passwords also allows criminals to detect your pattern and guess what a new pattern may be.

To check if your email has been featured in a breach (past and present, personal and work emails), simply go to www.haveibeenpwned.com. This website has over 11 billion compromised accounts at the time of writing, entering your email will show if it has been in one of the many breaches published by cybercriminals. If you reused one of those passwords, it’s a sure bet someone will try to log into an account of yours with that email and password, or perhaps using a new email address with the same password.

Naturally, the ‘normal’ protections should not be neglected as well, such as securing servers and computers with sensitive information via a firewall, malware prevention and encryption. And these should be kept up to date continually. Often smaller organisations can outsource this to third-party service providers who automatically monitor and check their systems, but the human element can’t be outsourced as an errant email can still get through.

Talk the talk

Many people talk about cybersecurity, but Alves says they only get serious when something happens: they lose money, suffer a ransomware attack, lose sensitive data etc. Of course, then it’s too late and an estate will lose money and the estate manager or security manager will probably have to take the blame – or if they are lucky, a service provider can be blamed. However, the blame will not reduce the money or reputation lost or the amount that must be spent in recovery.

Alves says he has seen businesses close because they could not recover from a cyber-attack. It can take weeks to rebuild your company if you don’t have up-to-date paper records to fall back on (if your backups can’t be restored or are also damaged, which happens more often as criminals delay their attack in order to encrypt or destroy your backups as well). And South Africa is one of the most unprotected countries in the world in terms of cybersecurity, meaning it is a juicy target. There are about 37 ransomware attacks per day hitting the country.

While those in control of budgets will complain about the cost of prevention, it really is minimal when compared to the cost of recovery and that excludes reputational damage and possible future legal action for negligent handling of personal information – and we may even see fines from the Information Regulator in this regard in the near future as well.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.