Digital economy needs an agile approach to cybersecurity

Issue 3 2025 Information Security, News & Events

As South Africa’s digital economy matures, cybercriminals are taking notice and targeting businesses across the country, with major financial consequences. Earlier this year, South African Airways (SAA) faced a significant cyber incident that disrupted access to its online platforms. In 2024, the National Health Laboratory Service (NHLS) was hit by a ransomware attack, which resulted in the loss of 1,2 terabytes of data. These are not isolated incidents, they represent a growing pattern of attacks against businesses that are unprepared when it comes to modern cybersecurity challenges.

“Cybersecurity frameworks offer a blueprint for digital safety and data regulation compliance, but as these develop and proliferate in response to emerging cyberthreats, choosing the right one is increasingly difficult. Particularly in high-risk sectors like fintech, retail, and healthcare, understanding specific requirements must be a top priority,” says Anscombe.


Tony Anscombe.

In 2020, South Africa implemented the Protection of Personal Information Act (POPIA), a legal framework aimed at protecting individuals’ rights to privacy. While these regulations establish what must be protected, cybersecurity frameworks offer a detailed roadmap for achieving compliance.

“Organisations that view cybersecurity frameworks as enablers of trust and innovation, not merely regulatory hurdles to overcome, will likely see more success. With strategic implementation, these frameworks provide the foundation for secure, sustainable digital transformation across the continent – provided they are interpreted and implemented in a way that makes sense for each business,” says Anscombe.

Cybersecurity frameworks

These frameworks generally fall into two categories: mandatory compliance frameworks that organisations must follow to comply with laws or industry regulations, and voluntary frameworks designed to improve their overall security posture. Many businesses struggle to determine which cybersecurity frameworks best address their specific needs, while satisfying regulatory requirements.

“For regulatory frameworks, there is no decision, they are a requirement that must be followed, with significant financial penalties for non-compliance. However, businesses still have important choices to make around voluntary frameworks. Business objectives, risk approach, available resources, and vendor support all influence which framework will be most beneficial,” says Anscombe.

The consequences of inadequate security measures extend beyond immediate financial losses, making compliance failure an urgent business concern across all industries. “Thanks to the disaster management protocol it already had in place, SAA was able to respond to the breach and get back online relatively quickly. However, in the case of the NHLS, the ransomware attack put sensitive medical data of millions of patients at risk and disrupted systems in the middle of dealing with an mpox outbreak,” says Anscombe.

The goal is not perfect compliance with every aspect of a framework, but rather effective protection that enables business growth. “If you take the approach of merely ticking boxes for minimum requirements, you may end up compliant, but not adequately protected. If you stick too strictly to all requirements, your team might become overwhelmed. Careful consideration of what is right for your business and industry, supported by an effective cybersecurity provider, is the best way to ensure protection,” says Anscombe.

For more information go to www.eset.com/za.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Keenfinity launches Radionix as new intrusion brand
Perimeter Security, Alarms & Intruder Detection News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
ProtecLink 2025 spotlights industry tensions and transformation
Magtouch Electronics t/a Ithegi Electronics Security Services & Risk Management News & Events
ProtecLink 2025, created and hosted by Ithegi Electronics, brought together key stakeholders from the security, finance, and innovation sectors under the theme "Connecting Security, Finance, and Innovation: Inspiring Transformation in the Industry."

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
SafeQuip issues certification update notice
SafeQuip Fire & Safety News & Events
SafeQuip has confirmed that the Lith-Ex range of fire extinguishers is the only certified lithium-ion battery fire extinguisher range in South Africa.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.