SA's cybersecurity risks to watch

April 2024 Information Security

The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers; even though it ranks 38th among major economies according to worlddata.info, several reports place it among the nations with the highest cybercrime density – especially in terms of victim numbers. This unfortunate distinction means South African organisations need to think more seriously about cyber risks and how to create a cyber-safe business.

"Organisations in South Africa are definitely becoming more aware of cyber risks," says Gerhard Swart, Chief Technology Officer at Performanta. "The country is rapidly digitising. Cloud adoption is at record levels, and more digital companies are opening offices in South Africa, especially as they look to enter the rest of the African continent. Connectivity and broadband are exploding. In 2023, the 2Africa submarine cable landed in SA, joining the seven other major international cables already here. All that progress attracts cybercrime, and local businesses must counter that risk."

Cybersecurity innovations are keeping in step with cyber risks, and there are more choices for protecting an organisation. However, knowledge remains the most important; cybersecurity and cybercrime are not static. Keeping an eye on trends is crucial. According to Swart, there are five trends that will stand out during 2024:

Generative AI will play a major role in cybercrime and cybersecurity

Generative artificial intelligence only entered the public mainstream in 2023, but it is already a dominating topic at South African organisations. The KPMG 2023 CEO Outlook Survey reported that 84% of local CEOs consider the technology a double-edged sword; very useful but also full of risks.

"Cybercriminals are using generative AI to rapidly scale and iterate scams such as phishing, business email compromises, and more sophisticated deepfaked audio and videos. These tactics will grow significantly in 2024 and are of particular concern to South African users who are frequently targeted by such scam attacks. But there is good news; cybersecurity vendors are starting to include generative AI to improve reporting and visibility and reduce demand on security staff,” says Swart.

Escalating attacks target local digital literacy gaps

Digital literacy is the best cybercrime deterrent because it makes it much harder for criminals to fool us. However, a deficiency in digital literacy makes people much easier and softer targets. Using a phone or computer is not enough – digital literacy means accessing, managing, understanding, integrating, and communicating digitally. South Africa's large digital divide, which excludes many people from becoming more digitally capable, will feed high local cybercrime rates.

"The digital divide is a big concern in South Africa. We have made strides in spreading connectivity, and the market caters to devices for all price brackets. However, many people are still barely digitally functional due to high costs and few avenues to help them improve their grasp of technology. Artificial intelligence is likely to make this gap even bigger, and there will be more cybercrime as a consequence,” says Swart.

Greater focus on phishing and stealing tokens

Multi-factor authentication (MFA) is a very potent way to block cyberattacks. MFA security requires users to enter tokens, such as a PIN code, a unique link, or approval through an authentication app - creating two or more steps that criminals must intercept. Those criminals are savvy to MFA, and there has been a rise in attempts to steal MFA tokens. In 2024, it is likely to see a big jump in these attacks.

Swart says, "Tactics to intercept or disable MFA security are getting better. There were already some interesting token-based attacks in 2023, and in 2024 we will see how much those criminal tools have improved. This does not invalidate MFA. Rather, it shows MFA must be part of a security culture built on good training and awareness."

Remote working prompts better security hygiene

For decades, IT environments were centralised and surrounded by walls of security, but as connectivity, the cloud, and the data era expanded, IT operations became more decentralised, which made them more vulnerable to cyberattacks. Remote and hybrid working amplifies this issue even further, especially since work-from-home employees lack sufficient security training and equipment.

"Hybrid work has many benefits, but it is a big cyber risk. Remote-working employees often do not get enough, or frequent, security training, and they often use personal equipment such as home routers that may have security flaws and are not managed by their company's security people. Criminals are exploiting this deficit, and attacks on remote employees are bound to escalate in 2024 unless companies strengthen their security training and remote-working support,” says Swart.

Increased emphasis on better cloud security

South Africa is Africa's dominant cloud market, with over 60% of the continent's data centres. More are in the pipeline, driven by strong cloud adoption among enterprises and SMEs that see cloud services as an avenue for resilience. However, cloud hosting does not naturally mean better security; though cloud providers often invest deeply in security, cloud users must also do their part, and criminals exploit those who do not.

"Cloud security is a very popular topic in business conversations. Companies know that they need the cloud as part of their technology strategies, but there is still confusion about the nature and requirements of cloud security. Some think hosting on a hyperscale public cloud will make them impervious. Others think they are safe because they have a small cloud footprint. However, neither of those beliefs is true, and many companies have learned the hard way; 2024 seems set to bring more profile to cloud security, both in awareness and in security solutions that focus on cloud risks,” concludes Swart.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.