South Africa a safe haven

April 2011 Information Security, Security Services & Risk Management

Business continuity strategies include many processes and methodologies designed to protect businesses from disasters and unexpected downtime. The latest advice from several industry leaders and research institutions, however, is that to be completely sure your data is secure, a third backup location should be located on a different continent, an off-continent information safe haven.

Bradley Janse van Rensburg, solutions design manager at ContinuitySA believes this is an important component of a business continuity plan for companies that are dependent on their information to run their businesses. “When your data is your lifeblood as well as your legal responsibility, you cannot be too careful in protecting it,” says Janse van Rensburg.

Bradley van Rensburg
Bradley van Rensburg

He adds that international companies have a ready-made safe haven in South Africa where they can be sure their data is safe from disaster. He highlights six factors that make South Africa a good choice as a safe haven.

Natural security: “South Africa is an extremely stable area in terms of natural disasters,” says Janse van Rensburg. “We are not exposed to the earthquakes, tornadoes and other natural disasters prevalent in other areas of the world. South Africa is therefore an ideal habitat for both people and data as very little protection is needed for survival here.”

Politically safe: The country has a stable democracy and a free media, which is an important consideration when storing sensitive data. It is also on good terms politically with other countries, with no potential of a war and a minimal threat of terrorism.

Skills availability: There is a wide representation of international technology firms in the country, which will assure off-continent business continuity seekers of fast access to skills and support. South Africa’s IT market is smaller, but no less competent than the best in the world.

Good location: South Africa is located in a good time zone for doing business with the EU and UK. Our business hours are about the same as theirs and English is the language of business, making it easy for international companies to communicate with their South African representatives and partners.

Connectivity: By 2012, there will be seven undersea cables coming into South Africa, giving the country 21 terabits of international bandwidth. The result will be a world-class communications infrastructure with plenty of resilience as the cables will be installed along the east and west coasts of Africa. Moreover, the country’s internal infrastructure has proven itself of a high quality that meets the most demanding business needs.

Ease of business: Finally, the ease of doing business in South Africa, currently ranked 34th in the world, makes setting up an offshore data storage centre simple. Companies are able to set up a safe haven in short order without endless red tape.

South Africa is ideal for international companies to use as an off-continent continuity location. The success of the 2010 FIFA World Cup is proof of the capabilities of the country, the skills available and the resilience and quality of its infrastructure.

For more information contact ContinuitySA, +27 (0)11 554 8000, [email protected], www.continuitysa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.