Data security sits at the heart of democracy

1 February 2019 Information Security, Security Services & Risk Management

A recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be ‘easily hacked’. The consequences for citizens of rogue military assets is unthinkable. But that fear is not reserved for fighter jets and frigates: the hacking of a nation’s tax collection system, for example, would have a crippling effect on the economy, global investor confidence, disbursement of social and public services, and citizen trust in government institutions.

Thomas Mangwiro: public sector security specialist, Mimecast
Thomas Mangwiro: public sector security specialist, Mimecast

South African cyber resilience in the spotlight

A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections. Without fully functional public institutions such as revenue collection, freight handling, military defence, and social grant disbursement, governments will find it hard to instil confidence among its various stakeholders and service delivery to citizens, businesses and public institutions will be impeded.

The rise of the smart city – a catch-all phrase for cities that utilise emerging technologies such as IoT to improve service delivery and enhance the citizen experience – further complicates matters. With the digitisation of government in full swing, any exploitation of cybersecurity vulnerabilities of the operational technologies that power our electricity generation or freight handling capabilities could cripple essential government services and leave millions without much-needed public or social services.

The South African government has taken note: the Cybersecurity Hub established by the Department of Telecommunications and Postal Services is a positive step toward improved cybersecurity awareness and information sharing across the South African public and private sectors. And Defence Minister Nosiviwe Mapisa-Nqakula’s recent commitment to collaborate with other countries to effectively deal with the challenge of modern cybersecurity is a timely acknowledgement that South Africa is as vulnerable to cyber threats as its more developed peers.

I would argue that Minister Mapisa-Nqakula and her colleagues should prioritise cyber resilience within the public sector as a first line of cyber defence. Cyber resilience refers to an organisation’s ability to continue to operate or deliver services despite adverse cyber events. And its first port of call in this regard should be greater awareness among its hundreds of thousands of employees regarding the different types of cybersecurity threats, how to spot them, and how to prevent them.

Action plan for improved cybersecurity awareness

In a global study by Mimecast and Vanson Bourne, more than a third of global public sector companies lacked confidence in their employees’ ability to identify impersonation fraud asking for sensitive company data such as HR or financial information. And yet, only 14% train their employees continuously to ensure they have the awareness and knowledge to identify potential cyber threats.

Awareness training, a process of ensuring employees have the knowledge and insight to identify potential cyber threats, is an indispensable part of any effective cyber defence strategy. But government should look beyond defence-only cybersecurity to a cyber resilience strategy built on three key principles:

1.) Ensuring the correct security measures are in place prior to an attack;

2.) Implementing a durability plan to keep email and business operations running during an attack; and

3.) Ensuring they have the ability to recover data and critical IP after an attack.

The ability to adapt to continually evolving and escalating cyber threats is critical, but it’s a task made immensely challenging by a global shortage of skilled security professionals. This places the spotlight on end-user training: without the relevant security skills in place, it becomes even more important for cybersecurity to be a shared responsibility across the organisation. Government-led education initiatives in collaboration with private sector companies can significantly improve the awareness of staff at all levels of the public service to identify and combat emerging cybersecurity threats.

The concept of cyber awareness training should play a starring role in any government-led cyber defence initiative. Public sector employees that display risky behaviour – such as opening emails from unknown senders, clicking on links without validating them first, opening attachments without care and using work devices for personal activities – should undergo regular training to ensure they understand the risks associated with such activities.

According to a Google Consumer Research report commissioned by Mimecast, nearly one in four employees aren’t even aware of the most basic cyber threats to their organisation, including phishing and ransomware. Imagine the dire consequences of a successful ransomware attack on a government department providing medical services to vulnerable citizens. Cybercriminals are constantly innovating and finding new ways to infiltrate organisations’ defences. So, without adequate awareness and understanding of the various ways cybercriminals could penetrate government systems, no amount of investment in technology will safeguard our public institutions.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.