Adopting a cyber-secure mindset

Issue 5 2022 Security Services & Risk Management, Information Security


Simeon Tassev.

Cybercrime is nothing new, but recently there has been a spate of reported vulnerabilities that have brought the topic back into the spotlight. This includes a security flaw in Apple devices, generally thought to be secure, which hackers have actively exploited to gain full control over iPhone, iPad and Mac devices.

Malware attacks are now more of a threat than ever, and neither individuals nor businesses can afford to be complacent about cybersecurity. Adopting a cybersecure mindset is key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Evidence in the numbers

There can be no doubt that cybercrime is a challenge that affects every single person using a connected device, and ransomware is among the biggest threats we face. The 2022 SonicWall Cyber Threat Report demonstrates the magnitude of the challenge: in 2021 there were 623 million ransomware attacks globally, which represents a 105% increase over 2020. In addition, the report highlights a sharp increase in encrypted threats, with 10 million attacks globally, as well as 97 million incidents of cryptojacking.

Not just a corporate problem

The repercussions of a successful ransomware attack can be devastating for a business, causing downtime, loss of productivity, reputational damage, compliance breaches and more. However, it is important to understand that cybersecurity is not just a corporate problem, because it can personally affect individuals whose identity and money can be stolen, whose data can be compromised, whose devices could be completely wiped, and whose lives can be badly affected by a malware breach.

The reality is that cybersecurity is everyone’s problem, and we need to be more aware of the threats and how they can affect us personally, as well as those around us. We need to develop a cybersecure mindset by taking responsibility for how we connect and how we behave while connected, to protect not only ourselves but others around us as well.

No such thing as ‘set and forget’

Security is not something that anyone can afford to take for granted. Even Apple devices, which many have complacently thought to be secure enough not to require external security solutions, are increasingly targets for attack. Cybersecurity is also not a technology that can simply be put into place and forgotten about. It needs to be constantly refreshed and updated to ensure it provides adequate protection against a constantly evolving threat landscape.

Above all, understand the risks

Being prepared for the worst-case scenario is key, but often it pays to go back to the basics. Make sure that you have backup and data protection, antivirus and anti-malware, and all of the appropriate technology in place, including mobile device protection, but do not rely only on these solutions. A multi-layered solution can help to build a solid security foundation, but human behaviour can override even the strongest of security frameworks. Understand the risks and the consequences when it comes to cyberthreats and ensure that being cybersecure is always top of mind.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Strengthening organisational integrity in 2026 and beyond
iFacts Security Services & Risk Management
In 2026, the risks facing organisations, whether in the corporate sector or government, will be more complex and far-reaching. Employee screening will have to be more complex and comprehensive.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.