New risk for IT security teams

Issue 4 2023 News & Events, Information Security

Microsoft’s recent Cyber Signals report highlights how cybercriminals are using operational technology (OT) as gateways into an organisation’s network. This comes at a time when IoT connections continue to grow. IoT connections in sub-Saharan Africa are set to double by 2030, giving cybercriminals more opportunities to breach networks and systems.

Microsoft’s Cyber Signals report is a regular cyberthreat intelligence brief spotlighting security trends and insights gathered from Microsoft’s 43 trillion daily security signals and 8500 security experts. The latest edition has found that converging IT, Internet of Things (IoT) and OT systems pose a wider risk to critical infrastructure.

The increase in digital transformation across the region has enabled organisations to manage their buildings, emergency systems and access control with smart devices connected to a network. In addition, Microsoft has seen an increase in IoT devices in the workplace to better enable hybrid work. This includes smart conference rooms with microphones and cameras, Wi-Fi routers and printers.

For CIOs in the Middle East and Africa (MEA), the impact of a possible security breach is top of mind in an increasingly complex threat environment. IDC research on enterprise security trends found that it is the top concern for senior IT security decision makers in South Africa, with half saying they are most concerned with the consequences of a possible breach in terms of brand reputation and financial loss. To combat the risk, 53% of organisations in South Africa have increased their security budgets over the past two years and 53% are investing in upskilling staff to increase technical knowledge of IT security.

However, as the threat landscape continues to expand, organisations need to rethink their cyber risk approach to stay one step ahead of would-be attackers. Cyber Signals found that there are currently over 1 million connected devices publicly visible on the Internet running Boa, an outdated and unsupported software still widely used in IoT devices and software development kits.

“Organisations are more connected than ever before. From the humble Wi-Fi router to the everyday office printer, IT teams need to view their IoT devices differently and secure them as they would any company laptop to prevent security breaches,” says Colin Erasmus, Chief Operations Officer at Microsoft South Africa. “Gaining complete visibility of an organisation’s OT systems and protecting its IoT solutions will go a long way in preventing cyberattacks.”

To learn more about IT, OT, and IoT threats, read the third edition of Cyber Signals.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Tech Trailblazers seeks the most innovative and diverse investors in enterprise tech
News & Events
This year, the global enterprise tech startup awards, the Tech Trailblazers, is looking for the most innovative and diverse VCs as well as its usual hunt for groundbreaking tech start-ups.

Read more...
ONVIF standards drive growth in physical security market
News & Events
ONVIF has announced that more than 30 000 product models in the $120  billion global physical security market meet the ONVIF conformance requirements for interoperability.

Read more...