Containing cyber security risks

1 April 2016 Information Security, Conferences & Events

The cost of cybercrime for the global economy has been estimated at $445 billion (about R4 992 billion) annually. In a recent article, McAfee’s Trevor Coetzee says cyber espionage and stealing individuals’ personal information is believed to have affected more than 800 million people during 2013 and financial losses from cyber theft could cause as many as 150 000 Europeans to lose their jobs, according to McAfee’s report.

Another report published by the Centre for Strategic and International Studies (June 2014) says: “The most important cost of cybercrime, however, comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth.”

So what are we doing to eradicate or, at the least, reduce this scourge? Sadly, in an article in bdlive.co.za, Basie von Solms, director of the University of Johannesburg’s Centre for Cyber Security, says that South Africa ranks low on a number of cyber security assessments due to a shortage of skills, combined with a lack of urgency in implementing measures to tackle cyber crime.

Securex 2016, Africa’s leading security and fire exhibition, covers a wide spectrum of security issues, including the scourge of cyber crime. The exhibition, which is being held between 24 and 26 May 2016, is the largest and most comprehensive forum for visitors from South Africa and Africa, to interact with leading local and international manufacturers and suppliers of the best brands in security and fire technology and services.

Andy Robb, chief technology officer at Duxbury Networking (a Securex 2016 exhibitor), says that there is a plethora of available products, each with its own area of focus, making it difficult – without the help of a seasoned consultant – to get the best fit for the requirements of individual networks.

Unfortunately, because of poor purchasing decisions, many organisations make use of only a fraction of the potential capabilities of their security investments. The result is a waste of resources and money that, with a more refined focus, could have been better spent elsewhere.

Before setting out to install a security system, it’s best to take time to understand the nature of what is being protected and its value to the company. Then produce a multi-faceted plan and an individualised budget for the protection of each highlighted asset.

Modern security solutions, such as intrusion detection systems (IDS) and integrated phase classification (IPC) methods, network access control (NAC), security information, event management (SIEM), unified threat management (UTM) and disaster recover (DR) systems – can all be purpose-built and tailored to suit specific applications.

Training is also an important criterion. Many organisations buy top-rate products but derive little benefit from them due to the neglect of on-going staff training and the regular up-skilling of those tasked with managing the ever-evolving installations.

Duxbury Networking is the local distributor for Cyberoam Technologies, the global network security appliances provider. It offers organisations future-ready security solutions for physical and virtual networks. Its products include next-generation firewalls and unified threat management (UTM) appliances that protect both the physical and virtual aspects of the network through user-identity-based policy controls which promote proactive security.

“We feel there is an urgent need to share critical information on cyber security with the African market. We align ourselves with exhibitors who have an increased focus on countering the effects of cybercrime, threats and policy, and the methods to effectively attack and mitigate it,” says Joshua Low, Securex Event Director at Specialised Exhibitions.

The ever-popular educational sessions in the free-to-attend Securex Seminar Theatre cover industry trends and legislation including talks on Cyber TSCM, and information and cyber security. Other visitor attractions include a New Products Display and the Business Matchmaking Service sponsored by Ideco, which allows visitors to be pre-matched with relevant exhibitors. This initiative allows meetings to be arranged in advance of the exhibition, thereby maximising the visitor’s time at Securex 2016.

Visitors can pre-register online at www.securex.co.za to avoid the queues at the exhibition.

To book a stand or discuss a sponsorship package, prospective exhibitors are encouraged to contact Sven Riddle or Zelda Jordaan on: [email protected] or [email protected] or visit www.securex.co.za.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.