Secure digital control

1 November 2019 Editor's Choice

The world is fast embracing the technology and potential of emergent solutions such as the Internet of Things (IoT), automation and digital transformation. Over the past few years, hype and conversation have centred around what these technologies can do, how they will shake up the business and the roots they will tear from the ground as they reinvent business processes and customer engagement.


Karien Bornheim.

Disruption walks hand in hand with digital transformation and success stories abound. Yet, Forrester hit the nail on the head when defining how most organisations are approaching this digital transformation today – pragmatically. According to Karien Bornheim, CEO of FABS, the next few years are critical to defining the long-term success of the organisation as it grapples with managing all the moving parts that IoT, transformation, and automation introduce.

“Organisations have been adopting more future-focused strategies as they strive to keep up with the rate of innovation and transformation,” says Bornheim. “This has introduced its fair share of complexities, not least of which is the implementation of a robust security posture. This should sit at the core of any digital transformation strategy, only it often doesn’t. It’s often seen as an extra expense or delay that isn’t entirely necessary. Yet, without this commitment to secure infrastructure and engagement, the organisation is gambling with its future.”

A Forrester study commissioned by Microsoft in 2018 highlighted the importance of security. It isn’t silver pantaloons that will shape the futuristic stance of the company, it is how well it has embedded security into infrastructure, third-party providers and employees. The report makes the salient point that “digital transformation, while necessary for business success, compounds the complexity of an already tangled security threat landscape”. The business must balance the necessity of digital and its integration throughout operations with the need to embed robust security at every point along the chain. The answer? Implement security in tandem with digital transformation.

A methodical approach

“Sustainable security doesn’t evolve from a ‘plug the holes’ approach,” says Bornheim. “Nor does it benefit from pushing the proverbial square solution into the round security hole. It has to be methodically introduced across every aspect of the digital transformation process.”

Doing digital securely not only mitigates the business risk of reputational harm, but of damage done to mission-critical devices and technologies. As the organisation becomes increasingly reliant on these devices, their disruption can have serious implications. Downtime, loss of equipment, inability to perform basic business tasks – these are just some of the expensive and time-consuming problems that walk into the business alongside the cybercriminal. Just think what the repercussions could be if an employee accidentally introduced ransomware to a healthcare facility and it put all the systems on lockdown?

“One of the weakest points of entry into the business is the employee,” says Bornheim. “It’s unreasonable to expect well educated businesspeople to be aware of what a ransomware or phishing email looks like, for example. They need to be trained, there must be a robust security policy in place, and systems should be geared towards preventing these situations from happening in the first place. It is important to invest into security skills and awareness training that ensure every individual in the business, from the skilled security teams to the employees, is aware of the threat and how to protect against it.”

There is no way that the business can run below the radar of the cybercriminal. Not anymore. The statistics are increasingly concerning as well-known organisations (and not such well-known ones), big and small, fall prey to cybercriminals thanks to DDoS attacks, ransomware or other vulnerabilities in ancient systems sweated to an inch of their lives in a stressful economy. This is further challenged by the fact that all the new devices, systems, touchpoints, cloud services, and applications that enhance digital transformation are opportunities for hackers.

“The surface of attack has extended and there is a higher chance of critical system damage,” concludes Bornheim. “To add to the mix is the increasingly intelligent nature of cybercrime – cybercriminals are organised and dedicated. Digital transformation also puts the business into a constant state of flux. ‘New in, old out’. ‘Cloud this, public cloud that’. It’s a melting pot that has to be carefully managed to ensure that a digital business is built on solid and secure foundations.”

There may be a significant risk in digital transformation, but it isn’t a step that the business can avoid, not if it wants to remain relevant and grow in the current market. Bypassing digital won’t necessarily bypass the threats either. The digital transformation and security conversation often seems like the chicken and the egg dilemma, it isn’t all bad news and terrifying statistics – organisations that embed security into the bedrock of digital transformation can protect against the cyber threat. It’s not too late until it is…




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.