Containing cyber security risks

1 April 2016 Information Security, Conferences & Events

The cost of cybercrime for the global economy has been estimated at $445 billion (about R4 992 billion) annually. In a recent article, McAfee’s Trevor Coetzee says cyber espionage and stealing individuals’ personal information is believed to have affected more than 800 million people during 2013 and financial losses from cyber theft could cause as many as 150 000 Europeans to lose their jobs, according to McAfee’s report.

Another report published by the Centre for Strategic and International Studies (June 2014) says: “The most important cost of cybercrime, however, comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth.”

So what are we doing to eradicate or, at the least, reduce this scourge? Sadly, in an article in bdlive.co.za, Basie von Solms, director of the University of Johannesburg’s Centre for Cyber Security, says that South Africa ranks low on a number of cyber security assessments due to a shortage of skills, combined with a lack of urgency in implementing measures to tackle cyber crime.

Securex 2016, Africa’s leading security and fire exhibition, covers a wide spectrum of security issues, including the scourge of cyber crime. The exhibition, which is being held between 24 and 26 May 2016, is the largest and most comprehensive forum for visitors from South Africa and Africa, to interact with leading local and international manufacturers and suppliers of the best brands in security and fire technology and services.

Andy Robb, chief technology officer at Duxbury Networking (a Securex 2016 exhibitor), says that there is a plethora of available products, each with its own area of focus, making it difficult – without the help of a seasoned consultant – to get the best fit for the requirements of individual networks.

Unfortunately, because of poor purchasing decisions, many organisations make use of only a fraction of the potential capabilities of their security investments. The result is a waste of resources and money that, with a more refined focus, could have been better spent elsewhere.

Before setting out to install a security system, it’s best to take time to understand the nature of what is being protected and its value to the company. Then produce a multi-faceted plan and an individualised budget for the protection of each highlighted asset.

Modern security solutions, such as intrusion detection systems (IDS) and integrated phase classification (IPC) methods, network access control (NAC), security information, event management (SIEM), unified threat management (UTM) and disaster recover (DR) systems – can all be purpose-built and tailored to suit specific applications.

Training is also an important criterion. Many organisations buy top-rate products but derive little benefit from them due to the neglect of on-going staff training and the regular up-skilling of those tasked with managing the ever-evolving installations.

Duxbury Networking is the local distributor for Cyberoam Technologies, the global network security appliances provider. It offers organisations future-ready security solutions for physical and virtual networks. Its products include next-generation firewalls and unified threat management (UTM) appliances that protect both the physical and virtual aspects of the network through user-identity-based policy controls which promote proactive security.

“We feel there is an urgent need to share critical information on cyber security with the African market. We align ourselves with exhibitors who have an increased focus on countering the effects of cybercrime, threats and policy, and the methods to effectively attack and mitigate it,” says Joshua Low, Securex Event Director at Specialised Exhibitions.

The ever-popular educational sessions in the free-to-attend Securex Seminar Theatre cover industry trends and legislation including talks on Cyber TSCM, and information and cyber security. Other visitor attractions include a New Products Display and the Business Matchmaking Service sponsored by Ideco, which allows visitors to be pre-matched with relevant exhibitors. This initiative allows meetings to be arranged in advance of the exhibition, thereby maximising the visitor’s time at Securex 2016.

Visitors can pre-register online at www.securex.co.za to avoid the queues at the exhibition.

To book a stand or discuss a sponsorship package, prospective exhibitors are encouraged to contact Sven Riddle or Zelda Jordaan on: [email protected] or [email protected] or visit www.securex.co.za.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.