Adopting a cyber-secure mindset

Issue 5 2022 Security Services & Risk Management, Information Security


Simeon Tassev.

Cybercrime is nothing new, but recently there has been a spate of reported vulnerabilities that have brought the topic back into the spotlight. This includes a security flaw in Apple devices, generally thought to be secure, which hackers have actively exploited to gain full control over iPhone, iPad and Mac devices.

Malware attacks are now more of a threat than ever, and neither individuals nor businesses can afford to be complacent about cybersecurity. Adopting a cybersecure mindset is key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Evidence in the numbers

There can be no doubt that cybercrime is a challenge that affects every single person using a connected device, and ransomware is among the biggest threats we face. The 2022 SonicWall Cyber Threat Report demonstrates the magnitude of the challenge: in 2021 there were 623 million ransomware attacks globally, which represents a 105% increase over 2020. In addition, the report highlights a sharp increase in encrypted threats, with 10 million attacks globally, as well as 97 million incidents of cryptojacking.

Not just a corporate problem

The repercussions of a successful ransomware attack can be devastating for a business, causing downtime, loss of productivity, reputational damage, compliance breaches and more. However, it is important to understand that cybersecurity is not just a corporate problem, because it can personally affect individuals whose identity and money can be stolen, whose data can be compromised, whose devices could be completely wiped, and whose lives can be badly affected by a malware breach.

The reality is that cybersecurity is everyone’s problem, and we need to be more aware of the threats and how they can affect us personally, as well as those around us. We need to develop a cybersecure mindset by taking responsibility for how we connect and how we behave while connected, to protect not only ourselves but others around us as well.

No such thing as ‘set and forget’

Security is not something that anyone can afford to take for granted. Even Apple devices, which many have complacently thought to be secure enough not to require external security solutions, are increasingly targets for attack. Cybersecurity is also not a technology that can simply be put into place and forgotten about. It needs to be constantly refreshed and updated to ensure it provides adequate protection against a constantly evolving threat landscape.

Above all, understand the risks

Being prepared for the worst-case scenario is key, but often it pays to go back to the basics. Make sure that you have backup and data protection, antivirus and anti-malware, and all of the appropriate technology in place, including mobile device protection, but do not rely only on these solutions. A multi-layered solution can help to build a solid security foundation, but human behaviour can override even the strongest of security frameworks. Understand the risks and the consequences when it comes to cyberthreats and ensure that being cybersecure is always top of mind.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.