SA's cybersecurity risks to watch

April 2024 Information Security

The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers; even though it ranks 38th among major economies according to worlddata.info, several reports place it among the nations with the highest cybercrime density – especially in terms of victim numbers. This unfortunate distinction means South African organisations need to think more seriously about cyber risks and how to create a cyber-safe business.

"Organisations in South Africa are definitely becoming more aware of cyber risks," says Gerhard Swart, Chief Technology Officer at Performanta. "The country is rapidly digitising. Cloud adoption is at record levels, and more digital companies are opening offices in South Africa, especially as they look to enter the rest of the African continent. Connectivity and broadband are exploding. In 2023, the 2Africa submarine cable landed in SA, joining the seven other major international cables already here. All that progress attracts cybercrime, and local businesses must counter that risk."

Cybersecurity innovations are keeping in step with cyber risks, and there are more choices for protecting an organisation. However, knowledge remains the most important; cybersecurity and cybercrime are not static. Keeping an eye on trends is crucial. According to Swart, there are five trends that will stand out during 2024:

Generative AI will play a major role in cybercrime and cybersecurity

Generative artificial intelligence only entered the public mainstream in 2023, but it is already a dominating topic at South African organisations. The KPMG 2023 CEO Outlook Survey reported that 84% of local CEOs consider the technology a double-edged sword; very useful but also full of risks.

"Cybercriminals are using generative AI to rapidly scale and iterate scams such as phishing, business email compromises, and more sophisticated deepfaked audio and videos. These tactics will grow significantly in 2024 and are of particular concern to South African users who are frequently targeted by such scam attacks. But there is good news; cybersecurity vendors are starting to include generative AI to improve reporting and visibility and reduce demand on security staff,” says Swart.

Escalating attacks target local digital literacy gaps

Digital literacy is the best cybercrime deterrent because it makes it much harder for criminals to fool us. However, a deficiency in digital literacy makes people much easier and softer targets. Using a phone or computer is not enough – digital literacy means accessing, managing, understanding, integrating, and communicating digitally. South Africa's large digital divide, which excludes many people from becoming more digitally capable, will feed high local cybercrime rates.

"The digital divide is a big concern in South Africa. We have made strides in spreading connectivity, and the market caters to devices for all price brackets. However, many people are still barely digitally functional due to high costs and few avenues to help them improve their grasp of technology. Artificial intelligence is likely to make this gap even bigger, and there will be more cybercrime as a consequence,” says Swart.

Greater focus on phishing and stealing tokens

Multi-factor authentication (MFA) is a very potent way to block cyberattacks. MFA security requires users to enter tokens, such as a PIN code, a unique link, or approval through an authentication app - creating two or more steps that criminals must intercept. Those criminals are savvy to MFA, and there has been a rise in attempts to steal MFA tokens. In 2024, it is likely to see a big jump in these attacks.

Swart says, "Tactics to intercept or disable MFA security are getting better. There were already some interesting token-based attacks in 2023, and in 2024 we will see how much those criminal tools have improved. This does not invalidate MFA. Rather, it shows MFA must be part of a security culture built on good training and awareness."

Remote working prompts better security hygiene

For decades, IT environments were centralised and surrounded by walls of security, but as connectivity, the cloud, and the data era expanded, IT operations became more decentralised, which made them more vulnerable to cyberattacks. Remote and hybrid working amplifies this issue even further, especially since work-from-home employees lack sufficient security training and equipment.

"Hybrid work has many benefits, but it is a big cyber risk. Remote-working employees often do not get enough, or frequent, security training, and they often use personal equipment such as home routers that may have security flaws and are not managed by their company's security people. Criminals are exploiting this deficit, and attacks on remote employees are bound to escalate in 2024 unless companies strengthen their security training and remote-working support,” says Swart.

Increased emphasis on better cloud security

South Africa is Africa's dominant cloud market, with over 60% of the continent's data centres. More are in the pipeline, driven by strong cloud adoption among enterprises and SMEs that see cloud services as an avenue for resilience. However, cloud hosting does not naturally mean better security; though cloud providers often invest deeply in security, cloud users must also do their part, and criminals exploit those who do not.

"Cloud security is a very popular topic in business conversations. Companies know that they need the cloud as part of their technology strategies, but there is still confusion about the nature and requirements of cloud security. Some think hosting on a hyperscale public cloud will make them impervious. Others think they are safe because they have a small cloud footprint. However, neither of those beliefs is true, and many companies have learned the hard way; 2024 seems set to bring more profile to cloud security, both in awareness and in security solutions that focus on cloud risks,” concludes Swart.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.