Cyber attackers’ focus on South African businesses

1 January 2020 Information Security

In a recent Carte Blanche episode, the investigative news programme revealed that South Africa had faced a number of major cyberattacks during 2019. One of the affected organisations was the Civil Aviation Authority, which was hit in July 2019.

City Power was hit with ransomware twice in a matter of months, with both incidents occurring at the end of the month when most South Africans receive their salaries and make payments, highlighting the fact that ransomware attackers will exploit flaws in IT infrastructure at critical times to gain optimum leverage.


Zamani Ngidi.

In July 2019, South Africa also experienced the longest running cyberattack campaign among all the regions monitored by email and data security company Mimecast, according to its quarterly Threat Intelligence Report. Four major cyberattack campaigns were detected in South Africa between July and September and several local financial services companies suffered the brunt of these attacks. According to Mimecast, it detected more than 116 000 attacks in SA over an eight-day period in July by an unknown actor or group, using various malware types.

The increasing frequency and voracity of cyber concerns are mirrored in Aon's 2019 Global Risk Management Survey where participants ranked cyberattacks and data breaches as #6 in the top 10 risks facing organisations today. Startling figures are changing business and public perceptions of cyberattacks and South African organisations of all sizes and industries are not immune to this scourge, and the subsequent fallout:

• Malware attacks in SA increased by 22% in the first quarter of 2019 compared to the first quarter of 2018, translating to around 13 842 attempted cyberattacks per day – Kaspersky Lab.

• A data breach in South Africa costs an average of R36,5 million, and the long tail costs of a data breach can be felt for years after the incident. SA ranked 7 out of 16 countries polled for the highest cost of a cyber breach – IBM security study conducted by the Ponemon Institute.

• Alarmingly, in terms of the cost per record breached, SA ranks much higher at 11 on a scale of 16 polled countries, costing US$155 per record – the same as for the UK and not that far behind the US ($242 per record), which is alarming when you consider the size of the US economy compared to South Africa – IBM security study conducted by the Ponemon Institute.

• In 2019 in South Africa, the average time to identity a breach was 175 days and 56 days to contain it – IBM security study conducted by the Ponemon Institute.

• Large businesses are not the only targets and hackers are indiscriminate. In fact, 43% of cyberattacks target small businesses according to the Verizon 2019 Data Breach Investigations Report (DBIR).

• Small businesses face disproportionately larger costs relative to larger organisations, which can hamper their ability to recover financially from the incident – IBM security study conducted by the Ponemon Institute.

• Lost business was the biggest contributor to data breach costs. The loss of customer trust had serious financial consequences for the companies studied, and lost business was the largest of four major cost categories that contributed to the total cost of a data breach – IBM security study conducted by the Ponemon Institute.

Why have cyberattacks and data breaches become so rampant?

Aon's 2019 Cyber Security Risk Report highlights some of the vulnerabilities:

1. The rapid expansion of operational data from mobile and edge devices, along with growing reliance on third-party – and sometimes even fourth-party – vendors and service providers, are heightening cyber risks.

2. The combination of faster networks and vulnerable devices – Internet of Things (IoT) and the forthcoming transition to 5G – opens more doors to destructive threats.

3. Employees remain one of the most common causes of breaches. In a 2018 Aon survey, 53% of respondents said their companies experienced an insider-related attack within the previous year. When an employee of a large healthcare company inadvertently opened a phishing email, nearly 80 million patient records on his system ended up in the hands of a foreign government.

4. Organised crime is now using former intelligence members for more sophisticated attacks, while state actors are both broadening the nature of their attacks and increasing their frequency.

5. Lastly, an ever-changing set of regulations from governments around the world compounds the difficulties of managing cyber risks.

According to Zamani Ngidi, client manager: Cyber Solutions at Aon South Africa, “South Africa will continue to see large-scale ransomware attacks that target admin credentials to gain access to and infect wider networks. The bottom line is that any organisation, regardless of size, ownership or sector that is reliant on technology and a network to conduct any aspect of its business is at risk.”

Despite the fact that the breadth and scope of cyber coverage has increased substantially since 2017, only 27% of participants in Aon's 2019 Global Risk Management Survey from the Middle East and Africa region have purchased cyber insurance.

“The risk that cybercrime poses is here, and it is very real. A lack of reporting on the matter is leaving many in the dark as to the resultant costs that a business could suffer as a result of a cyber breach, not only from an incident response perspective but also the subsequent business costs associated with a breach of this nature that can include aspects such as business interruption, loss of business and client trust, liability of directors and officers through to reputational damage,” explains Ngidi.

“Many companies simply do not have the luxury of a big balance sheet to absorb the risk and this is where the insurance and response programme becomes crucial. It necessitates a major shift in business thinking to view cyber risk as both a strategic and critical risk that holds a very real threat to a business and its operations. Proactive steps need to be put in place in order to prevent a business from becoming a statistic as far as possible in addition to having a solid incident response plan and cyber insurance in place to manage a worst-case scenario,” he adds.

Cyber risk assessments

According to Aon's 2019 Global Risk Management Survey , the use of cyber risk assessments has risen 16% since 2015. However, only 59% apply any formal process to identify and evaluate their cyber risks. The majority are also not using any financial metrics to communicate the materiality of cyber exposure. The general trend globally, specifically to cyber risks, is that organisations do not understand their biggest cyber risks and the implications they have for operations and the balance sheet.

“Whether you are a big or small operator, your company’s ability to protect against and recover from ransomware attacks relies on implementing proactive technical measures, business continuity plans and insurance to mitigate the financial and liability fallout. With a qualified risk advisor versed in the cyber risks facing South African businesses of all sizes, your organisation will be able to take the business through a comprehensive cyber risk assessment that will help quantify the risks your organisation is exposed to, as well as the potential fallout or financial quantum of such an incident. Having a built-for-purpose cyber insurance regime in place that is supported by an airtight incident response process will go a long way in achieving a cyber resilient operation,” concludes Ngidi.

Aon highlights four crucial steps to building a cyber resilient organisation:

1. Take it from the top. Cyber risk management must be an enterprise-wide effort, but accountability needs to sit at the very top of the organisation, with the board understanding the costs and consequences of a cyberattack.

2. Unite your business. Cyber risk is not just an IT security issue; it is a threat to the whole enterprise. It calls for a multi-discipline, multi-level response that involves every relevant stakeholder within the business.

3. Get ahead of the game. Businesses can no longer rely on bringing in a response team after an attack. Incident response training is critical in preparing organisations for a cyberattack and scenario planning helps to understand operational vulnerabilities and threats.

4. Protect your balance sheet. Firms should look at how they are leveraging available risk transfer opportunities. Cyber insurance can help protect an organisation’s balance sheet by providing a financial pay-out after things have gone wrong and providing pre-loss prevention and post-loss services.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.