Secure digital control

1 November 2019 Editor's Choice

The world is fast embracing the technology and potential of emergent solutions such as the Internet of Things (IoT), automation and digital transformation. Over the past few years, hype and conversation have centred around what these technologies can do, how they will shake up the business and the roots they will tear from the ground as they reinvent business processes and customer engagement.


Karien Bornheim.

Disruption walks hand in hand with digital transformation and success stories abound. Yet, Forrester hit the nail on the head when defining how most organisations are approaching this digital transformation today – pragmatically. According to Karien Bornheim, CEO of FABS, the next few years are critical to defining the long-term success of the organisation as it grapples with managing all the moving parts that IoT, transformation, and automation introduce.

“Organisations have been adopting more future-focused strategies as they strive to keep up with the rate of innovation and transformation,” says Bornheim. “This has introduced its fair share of complexities, not least of which is the implementation of a robust security posture. This should sit at the core of any digital transformation strategy, only it often doesn’t. It’s often seen as an extra expense or delay that isn’t entirely necessary. Yet, without this commitment to secure infrastructure and engagement, the organisation is gambling with its future.”

A Forrester study commissioned by Microsoft in 2018 highlighted the importance of security. It isn’t silver pantaloons that will shape the futuristic stance of the company, it is how well it has embedded security into infrastructure, third-party providers and employees. The report makes the salient point that “digital transformation, while necessary for business success, compounds the complexity of an already tangled security threat landscape”. The business must balance the necessity of digital and its integration throughout operations with the need to embed robust security at every point along the chain. The answer? Implement security in tandem with digital transformation.

A methodical approach

“Sustainable security doesn’t evolve from a ‘plug the holes’ approach,” says Bornheim. “Nor does it benefit from pushing the proverbial square solution into the round security hole. It has to be methodically introduced across every aspect of the digital transformation process.”

Doing digital securely not only mitigates the business risk of reputational harm, but of damage done to mission-critical devices and technologies. As the organisation becomes increasingly reliant on these devices, their disruption can have serious implications. Downtime, loss of equipment, inability to perform basic business tasks – these are just some of the expensive and time-consuming problems that walk into the business alongside the cybercriminal. Just think what the repercussions could be if an employee accidentally introduced ransomware to a healthcare facility and it put all the systems on lockdown?

“One of the weakest points of entry into the business is the employee,” says Bornheim. “It’s unreasonable to expect well educated businesspeople to be aware of what a ransomware or phishing email looks like, for example. They need to be trained, there must be a robust security policy in place, and systems should be geared towards preventing these situations from happening in the first place. It is important to invest into security skills and awareness training that ensure every individual in the business, from the skilled security teams to the employees, is aware of the threat and how to protect against it.”

There is no way that the business can run below the radar of the cybercriminal. Not anymore. The statistics are increasingly concerning as well-known organisations (and not such well-known ones), big and small, fall prey to cybercriminals thanks to DDoS attacks, ransomware or other vulnerabilities in ancient systems sweated to an inch of their lives in a stressful economy. This is further challenged by the fact that all the new devices, systems, touchpoints, cloud services, and applications that enhance digital transformation are opportunities for hackers.

“The surface of attack has extended and there is a higher chance of critical system damage,” concludes Bornheim. “To add to the mix is the increasingly intelligent nature of cybercrime – cybercriminals are organised and dedicated. Digital transformation also puts the business into a constant state of flux. ‘New in, old out’. ‘Cloud this, public cloud that’. It’s a melting pot that has to be carefully managed to ensure that a digital business is built on solid and secure foundations.”

There may be a significant risk in digital transformation, but it isn’t a step that the business can avoid, not if it wants to remain relevant and grow in the current market. Bypassing digital won’t necessarily bypass the threats either. The digital transformation and security conversation often seems like the chicken and the egg dilemma, it isn’t all bad news and terrifying statistics – organisations that embed security into the bedrock of digital transformation can protect against the cyber threat. It’s not too late until it is…




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.