South Africa a safe haven

April 2011 Information Security, Security Services & Risk Management

Business continuity strategies include many processes and methodologies designed to protect businesses from disasters and unexpected downtime. The latest advice from several industry leaders and research institutions, however, is that to be completely sure your data is secure, a third backup location should be located on a different continent, an off-continent information safe haven.

Bradley Janse van Rensburg, solutions design manager at ContinuitySA believes this is an important component of a business continuity plan for companies that are dependent on their information to run their businesses. “When your data is your lifeblood as well as your legal responsibility, you cannot be too careful in protecting it,” says Janse van Rensburg.

Bradley van Rensburg
Bradley van Rensburg

He adds that international companies have a ready-made safe haven in South Africa where they can be sure their data is safe from disaster. He highlights six factors that make South Africa a good choice as a safe haven.

Natural security: “South Africa is an extremely stable area in terms of natural disasters,” says Janse van Rensburg. “We are not exposed to the earthquakes, tornadoes and other natural disasters prevalent in other areas of the world. South Africa is therefore an ideal habitat for both people and data as very little protection is needed for survival here.”

Politically safe: The country has a stable democracy and a free media, which is an important consideration when storing sensitive data. It is also on good terms politically with other countries, with no potential of a war and a minimal threat of terrorism.

Skills availability: There is a wide representation of international technology firms in the country, which will assure off-continent business continuity seekers of fast access to skills and support. South Africa’s IT market is smaller, but no less competent than the best in the world.

Good location: South Africa is located in a good time zone for doing business with the EU and UK. Our business hours are about the same as theirs and English is the language of business, making it easy for international companies to communicate with their South African representatives and partners.

Connectivity: By 2012, there will be seven undersea cables coming into South Africa, giving the country 21 terabits of international bandwidth. The result will be a world-class communications infrastructure with plenty of resilience as the cables will be installed along the east and west coasts of Africa. Moreover, the country’s internal infrastructure has proven itself of a high quality that meets the most demanding business needs.

Ease of business: Finally, the ease of doing business in South Africa, currently ranked 34th in the world, makes setting up an offshore data storage centre simple. Companies are able to set up a safe haven in short order without endless red tape.

South Africa is ideal for international companies to use as an off-continent continuity location. The success of the 2010 FIFA World Cup is proof of the capabilities of the country, the skills available and the resilience and quality of its infrastructure.

For more information contact ContinuitySA, +27 (0)11 554 8000, [email protected], www.continuitysa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
NEC XON disrupts sophisticated cyberattack
Information Security
NEC XON recently showcased its advanced cyberthreat detection and response capabilities by successfully thwarting a human-operated ransomware attack targeting a major service provider.

Read more...
What’s your cyber game plan?
Information Security
“Medium-sized businesses are often the easiest target for cyber criminals, because they are just digital enough to be vulnerable, but not mature enough to be fully protected," says Warren Bonheim, MD of Zinia.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.