Where does SA logistics stand as far as cybersecurity is concerned?

Issue 8 2022 Logistics (Industry), Security Services & Risk Management

South Africa’s logistics industry is battling a war on many fronts. Bad weather, equipment breakdowns and shortages and congestion continue to hamper the country’s ports, adding days to the supply chain and creating havoc downstream.

The conflict in Ukraine and the weakness of the rand are exacerbating the situation, with inflation skyrocketing to the detriment of consumers.

In addition, South Africa is now firmly in the cross hairs of cyber criminals. Antivirus provider Kaspersky’s research shows that ransomware attacks in South Africa doubled between January and April 2022 compared to the same period last year.

The 2021 cyberattack on Transnet was especially damaging, impacting ports, harbours and pipelines to the point that the state enterprise was forced to declare force majeure at several container terminals.

Lesiba Sebola, director of information technology at Bidvest International Logistics (BIL), says it is paramount to safeguard IT infrastructure given how central it has become to operations.

“The bottom line is the financial losses incurred. Transnet, not being able to operate their ports affects us, and obviously, if there are attacks in our own environment that necessitates downtime of the infrastructure, it would be difficult to conduct business.”

Sebola says the most prevalent form of attack is phishing, which seeks to get information from users. “You need a multifaceted approach to protecting your information. We have perimeter security, which involves firewalls, and with operating systems there is always updates you need to do, whether it is an operating system update or security update, to eliminate vulnerabilities the providers have identified.”

However, Sebola stresses that the most important aspect of cyber security is user awareness. “The majority of successful attacks happen here. If your users are not aware, it is like taking a key to your house and throwing it over the security fence for attackers to use.”

“At BIL, we have an online program where staff can learn about security and the different types of attacks: e-mail impersonations, for example. If they spot an e-mail that looks a bit suspicious, we have a special process they follow to alert us so that we can investigate. This forms part of our induction process and occurs on a quarterly basis.”

Like Sebola, Craig Rosewarne, MD of cyber security company Wolfpack Information Risk, believes everyone is at risk of cyberattacks. “You could be an individual, a non-profit, a small charity, it does not matter. The hacker does not care where the money comes from.”

“The harsh reality is that attacks cannot be prevented, but organisations can defend against them, provided they recognise the complexity of digital crimes and tackle them accordingly.”

For Sebola, this means continuously monitoring networks to establish any irregular patterns. “You have to have an incident response plan in place, but you also cannot have a prescriptive one that is generic. This plan will tell you who needs to be involved, who the contact people are, and not just from IT. You need to establish who is involved from legal, operations and the communications side, because there are various aspects that you want to consider.”

“When you have cyber insurance, part of the requirement is that you inform them of any breaches. It is important to keep logs from the IT side. Make sure you contain the attack so that you can preserve the evidence. This is important in terms of the analysis later on to prevent such a breach from happening again.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.