Cybersecurity in South Africa

Issue 3 2025 Information Security

Cybercrime has become the single biggest threat to businesses worldwide. According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top. A decade ago, only 12% of global respondents cited cyber as a major concern. In 2025, that number surged to 38%.

Allianz notes, “Cyber is the top risk across North and South America, Europe, and Africa,” dominating industry concerns from aviation to legal services. More importantly, it now ranks as the number one risk in South Africa, overtaking long-standing issues like load shedding and political instability.


This concern is not just theoretical. Two recent, high-profile cyberattacks – one on mobile telecommunications provider Cell C and another on the South African Bureau of Standards (SABS) – have hit South Africa. Both incidents have raised serious questions about compliance, cybersecurity readiness, and whether these attacks could have been prevented.

Cell C confirmed in a December 2024 media release that it had suffered a major ransomware attack. Sensitive unstructured customer data – including ID numbers, bank details, driver’s licenses, medical records and passport information – was compromised and later leaked on the dark web. While a follow-up communication was sent to customers in early January 2025, the eight-day delay between public disclosure and customer notification drew criticism.

The SABS breach followed a similar pattern – ransomware paralysed the organisation’s systems in November 2024, with clients being informed on 26 November. Shockingly, it was later revealed in parliament that, by February 2025, core systems remained encrypted and inaccessible. This marked the third cyberattack on the SABS in just five years.

Was prevention possible?

Herman Stroop, lead ISO specialist at WWISE (World Wide Industrial & Systems Engineers), believes both attacks were entirely preventable.

“Neither Cell C nor SABS were ISO/IEC 27001 certified – a globally recognised standard for information security management,” Stroop explains. “This standard is not just a technical checklist. It is a framework that forces an organisation to understand its vulnerabilities, assess its risks, and apply controls that address these risks in a structured, auditable way.”

The ISO/IEC 27001 standard focuses on Confidentiality, Integrity, and Availability (CIA), the foundation of modern information security. It requires organisations to conduct ongoing risk assessments, implement policies and technical controls, and continuously monitor and update these defences in response to emerging threats.

According to Stroop, the absence of such a system is often due to a lack of strategic commitment from leadership. “Cybersecurity is wrongly seen as an IT issue,” he says. “Top management often fails to view it as a core business risk, resulting in underinvestment in preventative frameworks like ISO/IEC 27001.”

Regulation enforcement

Stroop adds that one key challenge in South Africa is poor enforcement of existing regulations. While the Protection of Personal Information Act (POPIA) and Minimum Information Security Standards (MISS) lay out clear expectations for information governance, many organisations either ignore or delay compliance due to a perceived lack of consequences.

“The irony is that prevention is far cheaper than remediation,” Stroop notes. “In many cases, organisations suffer reputational damage, legal liability, and operational downtime that far exceed the cost of implementing an ISO-compliant information security management system.”

Cell C and SABS also provide examples of poor transparency. Details about the nature of the attacks and how they were handled remain vague. “When an organisation is not ISO-certified, it usually does not have the documentation, procedures or incident response plans to respond properly, let alone communicate clearly during a breach.”

Preparation is not optional

According to the Information Regulator, between 150 and 300 cyberattacks are reported in South Africa each month, and that is just the reported incidents. Many go unreported due to reputational fears or because organisations are not compliant with POPIA and fear investigation.

Stroop believes that ISO 27001 should be mandated for public institutions and critical infrastructure operators. “Without minimum compliance levels, we are just waiting for the next disaster,” he says. “It is not a matter of if, but when.”

And there is movement. Some insurance providers are beginning to offer premium reductions for ISO-certified organisations, while major corporate clients now demand ISO 27001 certification from vendors. “It is becoming a market differentiator,” Stroop concludes. “Organisations, serious about protecting their data and reputation, cannot afford to ignore ISO 27001 any longer.”

In a digital age where the threat landscape evolves daily, being unprepared is no longer an option.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...