Preventing cyberattacks on critical infrastructure

Issue 4 2022 Industrial (Industry), Information Security


Carlo Bolzonello.

The notion of cyberattacks seems distant from our daily lives as we go about our work, social and family lives. Cyberattacks feel like they happen to big businesses which can quickly bounce back from them after the issue is identified and fixed, just as quickly as we would bounce back from being sick, once the illness was diagnosed and treated.

Cyberattacks have the potential to disrupt our lives completely, and in instances where critical national infrastructure is attacked, they could disrupt the country’s entire economy, leading to loss of life and livelihoods.

In the last few years, we’ve already seen successfully targeted advanced cyberattacks on some of our nation’s most critical economic functions, with devastating consequences. It’s not difficult to imagine what would happen if an attack was to be directed at one of South Africa’s state-owned enterprises or other essential parts of the country’s infrastructure: the country would be crippled and the economy severely damaged.

With nearly every element of South African society – from our banks and businesses to state-owned entities and government departments among others – all making use of the speed, efficiency and convenience of digital solutions, the country’s digital infrastructure needs a holistic, integrated security ecosystem and a cloud-first approach that makes it possible for all security products to work together.

This would be possible via an extended detection and response (XDR) approach to security, that uses machine learning and automation to complement human skills to protect private and public sector environments, helping them adapt and stay agile, and able to respond to active threats through dynamic prevention policies.

By harnessing the power of machine learning and automation to unlock insights and streamline workflows, organisations can stay one step ahead of adversaries, adapt to new threats, and accelerate detection and correction through the entire defence lifecycle.

This ‘living security’ approach makes public sector and private organisations more resilient through the interconnection of a wide variety of threat sensors and capabilities, so they know their operations are protected. It is native and open, and leverages an optimal blend of expert advice, assistance, and automation so security teams are more effective and efficient when incidents happen.

While South Africa does have the Critical Infrastructure Protection Act and the Cybercrimes Act in place, the former legislates the protection of infrastructure, while the latter deals specifically with cybercrime, making it easier for investigating agencies to gather evidence of cybercrime, and to seek support from their counterparts in other countries.

The true effectiveness of this legislation is yet to be determined, however, but the time to address cybercrime is before it happens, crippling the country’s infrastructure and resources, and before it’s too late to prevent catastrophic physical and reputational damage to the structures that keep our nation alive.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.