SA's cybersecurity risks to watch

April 2024 Information Security

The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers; even though it ranks 38th among major economies according to worlddata.info, several reports place it among the nations with the highest cybercrime density – especially in terms of victim numbers. This unfortunate distinction means South African organisations need to think more seriously about cyber risks and how to create a cyber-safe business.

"Organisations in South Africa are definitely becoming more aware of cyber risks," says Gerhard Swart, Chief Technology Officer at Performanta. "The country is rapidly digitising. Cloud adoption is at record levels, and more digital companies are opening offices in South Africa, especially as they look to enter the rest of the African continent. Connectivity and broadband are exploding. In 2023, the 2Africa submarine cable landed in SA, joining the seven other major international cables already here. All that progress attracts cybercrime, and local businesses must counter that risk."

Cybersecurity innovations are keeping in step with cyber risks, and there are more choices for protecting an organisation. However, knowledge remains the most important; cybersecurity and cybercrime are not static. Keeping an eye on trends is crucial. According to Swart, there are five trends that will stand out during 2024:

Generative AI will play a major role in cybercrime and cybersecurity

Generative artificial intelligence only entered the public mainstream in 2023, but it is already a dominating topic at South African organisations. The KPMG 2023 CEO Outlook Survey reported that 84% of local CEOs consider the technology a double-edged sword; very useful but also full of risks.

"Cybercriminals are using generative AI to rapidly scale and iterate scams such as phishing, business email compromises, and more sophisticated deepfaked audio and videos. These tactics will grow significantly in 2024 and are of particular concern to South African users who are frequently targeted by such scam attacks. But there is good news; cybersecurity vendors are starting to include generative AI to improve reporting and visibility and reduce demand on security staff,” says Swart.

Escalating attacks target local digital literacy gaps

Digital literacy is the best cybercrime deterrent because it makes it much harder for criminals to fool us. However, a deficiency in digital literacy makes people much easier and softer targets. Using a phone or computer is not enough – digital literacy means accessing, managing, understanding, integrating, and communicating digitally. South Africa's large digital divide, which excludes many people from becoming more digitally capable, will feed high local cybercrime rates.

"The digital divide is a big concern in South Africa. We have made strides in spreading connectivity, and the market caters to devices for all price brackets. However, many people are still barely digitally functional due to high costs and few avenues to help them improve their grasp of technology. Artificial intelligence is likely to make this gap even bigger, and there will be more cybercrime as a consequence,” says Swart.

Greater focus on phishing and stealing tokens

Multi-factor authentication (MFA) is a very potent way to block cyberattacks. MFA security requires users to enter tokens, such as a PIN code, a unique link, or approval through an authentication app - creating two or more steps that criminals must intercept. Those criminals are savvy to MFA, and there has been a rise in attempts to steal MFA tokens. In 2024, it is likely to see a big jump in these attacks.

Swart says, "Tactics to intercept or disable MFA security are getting better. There were already some interesting token-based attacks in 2023, and in 2024 we will see how much those criminal tools have improved. This does not invalidate MFA. Rather, it shows MFA must be part of a security culture built on good training and awareness."

Remote working prompts better security hygiene

For decades, IT environments were centralised and surrounded by walls of security, but as connectivity, the cloud, and the data era expanded, IT operations became more decentralised, which made them more vulnerable to cyberattacks. Remote and hybrid working amplifies this issue even further, especially since work-from-home employees lack sufficient security training and equipment.

"Hybrid work has many benefits, but it is a big cyber risk. Remote-working employees often do not get enough, or frequent, security training, and they often use personal equipment such as home routers that may have security flaws and are not managed by their company's security people. Criminals are exploiting this deficit, and attacks on remote employees are bound to escalate in 2024 unless companies strengthen their security training and remote-working support,” says Swart.

Increased emphasis on better cloud security

South Africa is Africa's dominant cloud market, with over 60% of the continent's data centres. More are in the pipeline, driven by strong cloud adoption among enterprises and SMEs that see cloud services as an avenue for resilience. However, cloud hosting does not naturally mean better security; though cloud providers often invest deeply in security, cloud users must also do their part, and criminals exploit those who do not.

"Cloud security is a very popular topic in business conversations. Companies know that they need the cloud as part of their technology strategies, but there is still confusion about the nature and requirements of cloud security. Some think hosting on a hyperscale public cloud will make them impervious. Others think they are safe because they have a small cloud footprint. However, neither of those beliefs is true, and many companies have learned the hard way; 2024 seems set to bring more profile to cloud security, both in awareness and in security solutions that focus on cloud risks,” concludes Swart.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Business logic vulnerabilities: the silent cyberthreat
Information Security
New Magix R&D Lab white paper helps local businesses identify hidden cybersecurity weaknesses that do not stem from the usual coding errors or configuration flaws that security tools are designed to detect.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.