South Africa is a target for cyber attacks

November 2017 Editor's Choice, Information Security, Security Services & Risk Management

Following the announcement by large South African data centre operator and website hosting service provider Hetzner, that a key database had been hacked, Maeson Maherry, chief solutions officer for LAWtrust, Africa’s leading cybersecurity firm, says numerous data breaches over the past few weeks show South Africa is a “focus area for cyber attacks”.

The Hetzner breach – which was discovered on Wednesday 1 November, follows the revelation two weeks ago that over 30-million South Africans’ personal information (including property ownership, income and employment history) had been exposed online, in what is considered South Africa’s biggest data breach.

“We are effectively in a Cold War where the goal has become less about disruption and more about stealing data,” Maherry says. He says it is imperative that South African businesses act to protect their data and their brand, and retain customer confidence.

“Businesses have to provide multilayered defences to protect the data and this has to be done in such a way that the information services are still accessible and convenient to customers.”

This means businesses need to put in place strong authentication for all administrators, employees and customers in light of the breaches. Companies also have to encrypt everything, including data in databases, file servers and data in the cloud.

“It is not a question anymore of whether an organisation will be breached, but how and when. Therefore, businesses must consider bringing the protection close to data itself – encrypt your data, while taking into account preservation of business functionalities and convenience for the users. Encrypting everything will become the norm in the future,” says Dr Aleksandar Valjarevic, head of pre-sales at LAWtrust.

Maherry adds that businesses also have to consider how they manage the cryptographic keys, SSH keys and digital certificates that are the foundation of the security plumbed into enterprise and cloud IT. “If an employee can leave with a copy of the SSH key for a server and a business can’t do anything about it, then that business is in extreme danger,” he says.

For more information contact LAWtrust, +27 (0)11 731 8238, [email protected], www.lawholdings.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...