Cybersecurity is now a digital transformation imperative

SMART Cybersecurity Handbook 2022 Editor's Choice

Cybersecurity is more than just a top priority for modern enterprises that have had to adapt to widespread change and the move to remote and hybrid workplaces in the past 18 months. This is according to the Enterprise Security Trends in South Africa survey, conducted by the IDC and commissioned by Microsoft, which highlights the latest cloud security developments across all industries in South Africa.

Nearly half (48%) of organisations in the country are using cloud as a platform and driver of digital innovation and 61% of South African organisations say they plan to spend more on cloud solutions in 2022.

In fact, the research reveals that security now acts as an enabler for the rapid digital transformation needed for South African companies to remain competitive – which is increasingly driven by the adoption of cloud capabilities and the flexibility, agility, resilience and security the cloud offers.

The research shows that cloud security is the number one priority for investment, with 28% of South African business leaders stating they will move to the cloud to help address security priorities.

Cloud security is proving to be vital for protecting organisations from exposure to any kind of cyber risk and South African business leaders are well aware of the threat. The research shows that 50% are concerned with the consequences of security breaches, particularly in terms of damage to brand reputation and financial loss.

“The accelerated pace of digital transformation and the huge amount of data processed and stored in the cloud is attracting the attention of threat actors. Attacks are continuing to evolve, with more sophisticated attack vectors from a greater number of bad actors and enterprises are becoming more vulnerable,” says Mark Walker, associate vice-president for sub-Saharan Africa at IDC.

Making skilling a security priority

53% of the country’s business leaders say skilling is one of their top security transformation priorities and increasing technical knowledge of cybersecurity is a critical need.

“Critically, however, security transformation is no longer just about strengthening corporate security. In addition to investing in the most advanced tools and solutions to build layers of security that will protect the organisation’s data, apps, databases, networks and systems, it is about upskilling/reskilling security experts, redesigning security strategies and improving employee and executive security awareness,” says Colin Erasmus, modern workplace and security business group lead at Microsoft South Africa.

There is also widespread recognition of the need to build a security culture in order to increase the understanding of security’s value to the business, as well as drive security awareness.

“People, process and technology need to be in harmony because businesses can have the most sophisticated technology and comprehensive processes in place to monitor, detect and respond to breaches, but if a person gives their password away or clicks on a phishing email, it becomes exponentially more difficult to protect the organisation,” says Erasmus.

In this way, the building blocks of skilling and raising security awareness start with identity, since it remains where people are most vulnerable. The research shows that business leaders in South Africa understand this: confirming users’ identities, together with an additional layer of security, is emerging as the most important security priority for 49% of business leaders in South Africa in the next six to 18 months.

The Zero Trust principle

The need to confirm identity is a central feature of the Zero Trust principle, which is emerging as a guiding security strategy for businesses in the face of rapid change to workplaces. This model means trusting no individual or system, needing to explicitly verify their identity, using least privilege access to give them access only to what they need, for as long as they need it, and always assuming breach.

“As well as adopting security strategies like Zero Trust and skilling their employees in these principles and how to handle new types of attacks from multiple different vectors, South African businesses need to develop an organisational understanding to manage cybersecurity risk to systems, people, assets, data and capabilities,” says Walker.

“The good news is that most organisations in South Africa continue to increase their security budgets, with 53% increasing their investments in the past two years and 51% responding faster and more effectively to new threats. An ongoing investment in strengthening security postures will act as a differentiator and competitive advantage in a rapidly evolving business landscape,” says Erasmus.

To find out more about cloud security trends in South Africa, read the Cybersecurity: a Digital Transformation Imperative whitepaper via the short URL: www.securitysa.com/*cyber2




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...