Innovating your way to better cybersecurity

Issue 1 2022 Editor's Choice

The growth of the Digital Customer Experience has begun a revolution in the way organisations do business – most notably are the shifts to cloud and mobile technologies. These innovations are reportedly driving the modern business era, unfortunately they are also exposing new threats and security concerns for companies bent on transforming to digital platforms – a must if they are to remain competitive. Leading industry researchers and analysts are predicting a rapid growth trajectory for these market-disrupting technologies that will continue to increase the spotlight on gaps in cybersecurity, risk management and compliance.


Edison Mazibuko.

Industry reports prove the fragile state of cybersecurity:

• Cyberattacks occur more than 2,2 thousand times a day, with 71% of malware attempts being financially motivated.

• 80% of firms have seen an increase in cyberattacks this year.

• Approximately US$6 trillion was expected to be spent globally on cybersecurity last year.

The stats may seem incredible, but these latest trends are emerging alongside technologies including artificial intelligence and machine learning. The latest cybersecurity statistics confirm:

• Most cybersecurity breaches are caused by human error.

• Only 5% of the average company’s folders are protected.

• In 94% of cases, the malware reaches targets via email.

• Cybercrime costs organisations $2,9 million every minute.

• Due to Covid-19, cybercrime has risen by 600%.

• The average global cost of a data breach is $3,86 million.

This last figure is approximate because it can do nothing other than grow and most likely exponentially.

The cloud

The business world has moved on from should or how do I move to the cloud. Businesses debating the need to go to the cloud have quite possibly already found a spot on the ark carrying fax machines and videos. A move to the cloud is an essential element of implementing a digital transformation strategy that aims to grow a business.

KPMG confirms that the question today is more around the issue of, now that you are in the cloud, how do you ensure you have optimised your investment and risk exposure?

Emerging technologies driving cybersecurity innovation

The top five emerging technologies are well set out in this report. The following are said to be responsible for the cybersecurity industry’s production of innovative developments:

• AI and machine-learning – in the world of cybersecurity, both of these innovations are predominantly related to risk identification systems. Automation provides detection of cyber breaches and can also safeguard attack targets.

• Behavioural analytics – this has become an integral part of advanced cybersecurity solutions, constantly evolving to provide stronger protection. This technology allows all behavioural data to be stored and then processed to examine trends, patterns and habits in workflows.

• Blockchain can eliminate the authentication process as a potential attack spot because it can authenticate devices and users without the need for passwords. Moreover, each transaction is timestamped and digitally signed so it can’t be reversed or tampered with. Thanks to blockchain technology, cybersecurity promises a new dimension of conducting business transactions safely.

• Zero-trust – this model requires all users to be authenticated and authorised before accessing data and resources, even when they are inside the organisation’s enterprise network. This architecture takes nothing for granted.

• Hardware authentication is an innovative technology that generates unique and temporary cryptographic code for users to type in alongside passwords in order to gain access to stored data. This kind of approach relies on dedicated physical evidence for user authentication, combined with passwords.

So, to finish off where I started, as much as we hate cyberattacks, we must acknowledge that they never stop innovating. So how can we deal with these attacks if we are not striving to innovate? Today's digital world is comprised of cloud computing, mobile accessibility, big data, machine learning, artificial intelligence and more. Reactive strategies and solutions simply will not cut it when it comes to addressing new threats as and when they arise. It is essential for cybersecurity professionals to be innovative and to implement these innovations into practice as we increasingly move into a digitally enabled future.

Keeping up with the bad guys is not the name of the game. Rather, being 10 steps ahead of them with new technologies that aim to outwit; outpace and beat them at their own game.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Autonomous construction site protection
Editor's Choice Perimeter Security, Alarms & Intruder Detection
Ajax provides an autonomous security solution for a German construction site that is easy and flexible to install. It provides security against intrusions and theft via a 360-degree view.

Read more...
SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Creating employment through entrepreneurship
Technews Publishing Marathon Consulting Editor's Choice Integrated Solutions Residential Estate (Industry)
Eduardo Takacs’s journey is a testament to bona fide entrepreneurial resilience, making him stand out in a country desperate for resilient businesses in the small and medium enterprise space that can create employment opportunities.

Read more...
2024 Southern Africa OSPAs winners announced
Editor's Choice
The 2024 Southern Africa Outstanding Security Performance Awards (OSPAs) winners were revealed on Tuesday, June 11th, at the Securex South Africa Seminar Theatre hosted by SMART Security Solutions.

Read more...
Resident management app shows significant growth
Editor's Choice
My Estate Life is a mobile app for residents and managers in housing estates and buildings. Its core aim is to be an easy gateway for residents to manage visitors and staff, and to communicate and administer general property in a simple interface.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...