SA's cybersecurity risks to watch

April 2024 Information Security

The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers; even though it ranks 38th among major economies according to worlddata.info, several reports place it among the nations with the highest cybercrime density – especially in terms of victim numbers. This unfortunate distinction means South African organisations need to think more seriously about cyber risks and how to create a cyber-safe business.

"Organisations in South Africa are definitely becoming more aware of cyber risks," says Gerhard Swart, Chief Technology Officer at Performanta. "The country is rapidly digitising. Cloud adoption is at record levels, and more digital companies are opening offices in South Africa, especially as they look to enter the rest of the African continent. Connectivity and broadband are exploding. In 2023, the 2Africa submarine cable landed in SA, joining the seven other major international cables already here. All that progress attracts cybercrime, and local businesses must counter that risk."

Cybersecurity innovations are keeping in step with cyber risks, and there are more choices for protecting an organisation. However, knowledge remains the most important; cybersecurity and cybercrime are not static. Keeping an eye on trends is crucial. According to Swart, there are five trends that will stand out during 2024:

Generative AI will play a major role in cybercrime and cybersecurity

Generative artificial intelligence only entered the public mainstream in 2023, but it is already a dominating topic at South African organisations. The KPMG 2023 CEO Outlook Survey reported that 84% of local CEOs consider the technology a double-edged sword; very useful but also full of risks.

"Cybercriminals are using generative AI to rapidly scale and iterate scams such as phishing, business email compromises, and more sophisticated deepfaked audio and videos. These tactics will grow significantly in 2024 and are of particular concern to South African users who are frequently targeted by such scam attacks. But there is good news; cybersecurity vendors are starting to include generative AI to improve reporting and visibility and reduce demand on security staff,” says Swart.

Escalating attacks target local digital literacy gaps

Digital literacy is the best cybercrime deterrent because it makes it much harder for criminals to fool us. However, a deficiency in digital literacy makes people much easier and softer targets. Using a phone or computer is not enough – digital literacy means accessing, managing, understanding, integrating, and communicating digitally. South Africa's large digital divide, which excludes many people from becoming more digitally capable, will feed high local cybercrime rates.

"The digital divide is a big concern in South Africa. We have made strides in spreading connectivity, and the market caters to devices for all price brackets. However, many people are still barely digitally functional due to high costs and few avenues to help them improve their grasp of technology. Artificial intelligence is likely to make this gap even bigger, and there will be more cybercrime as a consequence,” says Swart.

Greater focus on phishing and stealing tokens

Multi-factor authentication (MFA) is a very potent way to block cyberattacks. MFA security requires users to enter tokens, such as a PIN code, a unique link, or approval through an authentication app - creating two or more steps that criminals must intercept. Those criminals are savvy to MFA, and there has been a rise in attempts to steal MFA tokens. In 2024, it is likely to see a big jump in these attacks.

Swart says, "Tactics to intercept or disable MFA security are getting better. There were already some interesting token-based attacks in 2023, and in 2024 we will see how much those criminal tools have improved. This does not invalidate MFA. Rather, it shows MFA must be part of a security culture built on good training and awareness."

Remote working prompts better security hygiene

For decades, IT environments were centralised and surrounded by walls of security, but as connectivity, the cloud, and the data era expanded, IT operations became more decentralised, which made them more vulnerable to cyberattacks. Remote and hybrid working amplifies this issue even further, especially since work-from-home employees lack sufficient security training and equipment.

"Hybrid work has many benefits, but it is a big cyber risk. Remote-working employees often do not get enough, or frequent, security training, and they often use personal equipment such as home routers that may have security flaws and are not managed by their company's security people. Criminals are exploiting this deficit, and attacks on remote employees are bound to escalate in 2024 unless companies strengthen their security training and remote-working support,” says Swart.

Increased emphasis on better cloud security

South Africa is Africa's dominant cloud market, with over 60% of the continent's data centres. More are in the pipeline, driven by strong cloud adoption among enterprises and SMEs that see cloud services as an avenue for resilience. However, cloud hosting does not naturally mean better security; though cloud providers often invest deeply in security, cloud users must also do their part, and criminals exploit those who do not.

"Cloud security is a very popular topic in business conversations. Companies know that they need the cloud as part of their technology strategies, but there is still confusion about the nature and requirements of cloud security. Some think hosting on a hyperscale public cloud will make them impervious. Others think they are safe because they have a small cloud footprint. However, neither of those beliefs is true, and many companies have learned the hard way; 2024 seems set to bring more profile to cloud security, both in awareness and in security solutions that focus on cloud risks,” concludes Swart.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...