Prepare for the worst

March 2019 Security Services & Risk Management

Arcserve Southern Africa cautions SA businesses to take a proactive approach to Business Continuity and Data Recovery (BCDR) or risk becoming the next data breach headline.

Byron Horn-Botha
Byron Horn-Botha

“In today’s digital world, the issues of data privacy and data security are sources of significant concern for organisations,” says Byron Horn-Botha, Arcserve Southern Africa, lead: channel and partnerships.

He emphasises no one is immune to data breaches. “We understand that every organisation, regardless of industry, can be susceptible to breaches. Data privacy is a growing concern, and it’s not just limited to GDPR/ransomware, but to data protection providers themselves. However, it is becoming more difficult to ensure data is safe and secure. In fact, 64% of global IT decision-makersi agree that protecting business critical data has become increasingly difficult over the past five years.”

Horn-Botha notes that the general public is also increasingly sensitive about the security of its data and are moving their purchasing power away from organisations they consider to be a data protection risk. “In this climate, any loss of customer data could cause irreparable damage to an organisation’s reputation and bottom line. All business leaders need to ask the pressing question: what can be done to avoid becoming the next data breach headline?”

Horn-Botha outlines four strategic steps organisations need to take:

Ensure your organisation has a comprehensive BCDR plan. “When Arcserve surveyed IT professionals around the world, we found that more than half of businesses reviewed didn’t have a disaster recovery (DR) plan in place, and of those who did, less than 15% had confidence in recovery. Arcserve’s eBook on enhancing your BCDR plan (How to Build a Disaster Recovery Plan, available at delivers the fundamentals of successful disaster recovery planning.”

Test your disaster recovery plan again and again. “Ask yourself if your disaster recovery plan will see you through ransomware attacks, hardware failures and natural disasters — or will you be caught flat-footed? If you can’t answer these questions with an unequivocal, ‘we’re ready’ you should be investing greater time and resources in disaster recovery testing.”

Know what to do before and after a ransomware attack. “According to Cyber Security Ventures, cyber-attacks are expected to skyrocket, with the frequency of attacks estimated to be one every 14 seconds by the end of 2019ii. Arcserve’s Ransomware Prevention Checklist ( provides vital information on how to prevent ransomware attacks and what steps to take immediately following an attack.”

Partner with a data protection vendor you can count on for compliance requirements. “The potential financial penalties for regulations such as GDPR can be crippling, and the damage to your brand reputation can be devastating. Ensure you work with a data protection vendor that takes regulatory compliance as seriously as you do by offering compliance-driven technology designed with specific capabilities to address local and global regulations.”

For more information contact Arcserve Southern Africa +27 11 417 8641,,



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Social media and intelligence-led surveillance
July 2019, Leaderware , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Social media has become a major feature of most people’s lives in the last few years and they can be invaluable as a source of information for companies and security organisations.

The 4th Industrial Revolution
July 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Security Services & Risk Management, Industrial (Industry)
Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril.

Fake videos not threat to courtroom evidence
July 2019 , Security Services & Risk Management
The Washington Post recently reported top AI researchers are “racing to defuse an extraordinary political weapon: computer-generated fake videos that could undermine candidates and mislead voters".

Fear of the unknown
July 2019, Kaspersky Lab , Cyber Security, Security Services & Risk Management
Fear of the unknown: while there’s still interest in cryptocurrencies, just 19% locally understand how they work.

Leveraging on Africa
July 2019, Managed Integrity Evaluation , Security Services & Risk Management
The purpose of cross-border expansion is to not only ensure sustainable growth and business viability, but also the ability to mitigate growing market risk and uncertainties across the globe.

Assess business resilience in terms of value
July 2019, ContinuitySA , Security Services & Risk Management
Looking at the total value of the investment (VOI) is a far better way of assessing the worth of an in-vestment with many intangible benefits.

Social media and background checks
July 2019, Managed Integrity Evaluation , Security Services & Risk Management
Social media screening and online checks can provide many benefits to a hiring employer; however, such screening should not be carried out in isolation.

Johnson Controls launches Technology Contracting in Africa
July 2019, Johnson Controls , Editor's Choice, News, Security Services & Risk Management
To address the growing challenge of planning, integrating and maintaining a multitude of different, highly connected systems, Johnson Controls is launching Technology Contracting in Africa.

A new method for data destruction
July 2019 , News, Security Services & Risk Management
Xperien is now able to professionally erase data on retired IT assets in compliance with the Protection of Personal Information Act (PoPIA).

Automated contraband detection
July 2019 , Security Services & Risk Management, Transport (Industry)
Today’s X-ray screening solutions have been updated with auto-detection capabilities that will raise an alert if a weapon or even small quantities of explosives and toxic materials are detected.