Six-month lifespan of technology

April 2013 Information Security

In 2010, the South African government declared cybersecurity to be a national security priority. Since then, the country has been victim to trading stoppages at the Johannesburg Stock Exchange because of technological difficulties faced by its telecoms service provider, blackouts because of Eskom’s systems being disrupted, and the well-known January 2012 theft of R42 million from Postbank (the banking subsidiary of the country’s Post Office).

According to international technology provider, Thales SA, South Africa’s major institutions are at risk to a growing number of possibly debilitating cyberthreats because of the lack of continuous sophistication of cybercrime technology by the vast number of 'cybersecurity specialists' operating in the country. The reality is that the smarter technologies and modus operandi of cyber criminals – both locally and abroad – are not being effectively matched by preventative technologies that pass their sell-by date after six months of being developed.

Llewellyn Hartnick, cybersecurity specialist at Thales SA, says, “We are moving towards an electronic age. We have e-filing of citizens’ tax returns, a national online traffic fine system, electronic voice, video and written databases that are being built and maintained across sectors in the private and public sectors. It is therefore true that our growing dependence on technology naturally opens up the window of opportunity for criminal elements. Despite the recognition that cybersecurity is a growing issue of national importance there seems to be little understanding that technological developments have a global life span of, at most, six months. This means that effective security requires more than identification of the risks or sanctioning of the guilty criminals; it requires preventative mechanisms that are not only customised to specific sectors and operations but, that are more importantly, continuously upgraded in a way that consistently prevents the growing number of sophisticated attacks on one’s systems.

“Unlike countries that enjoy the benefits of cheap labour, as a country, South Africa cannot afford to invest huge portions of the national budget on continuously developing improved cybersecurity technologies. The responsibility therefore falls on individual organisations to maintain its electronic assets as best as possible, and it is there that lies the problem,” adds Hartnick.

“Having developed cyber security solutions over the past five years we know what is needed, from an organisational perspective, to protect electronic assets. Organisations (in the private and public sector) are specialists at what they do so it is unrealistic to expect our country’s stock exchange to be experts at cybercrime, or to expect our country’s energy distributor to maintain up-to-date cybersecurity technologies. South African organisations don’t and shouldn’t expend their time on developing and maintaining technologies that keep them and their customers safe.

This lack of in-house expertise and budget means that there is a greater reliance on South African service providers to use global best practices as a benchmark in preventing attacks, although in our experience this does not seem to be the case currently as our country’s major institutions remain at considerable risk because of a lack of awareness or implementation of evolving global technology standards,” comments Hartnick.

For more information contact Thales, +27 (0)11 313 9001, Llewellyn.hartnick@thalesgroup.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.