Secure digital control

1 November 2019 Editor's Choice

The world is fast embracing the technology and potential of emergent solutions such as the Internet of Things (IoT), automation and digital transformation. Over the past few years, hype and conversation have centred around what these technologies can do, how they will shake up the business and the roots they will tear from the ground as they reinvent business processes and customer engagement.


Karien Bornheim.

Disruption walks hand in hand with digital transformation and success stories abound. Yet, Forrester hit the nail on the head when defining how most organisations are approaching this digital transformation today – pragmatically. According to Karien Bornheim, CEO of FABS, the next few years are critical to defining the long-term success of the organisation as it grapples with managing all the moving parts that IoT, transformation, and automation introduce.

“Organisations have been adopting more future-focused strategies as they strive to keep up with the rate of innovation and transformation,” says Bornheim. “This has introduced its fair share of complexities, not least of which is the implementation of a robust security posture. This should sit at the core of any digital transformation strategy, only it often doesn’t. It’s often seen as an extra expense or delay that isn’t entirely necessary. Yet, without this commitment to secure infrastructure and engagement, the organisation is gambling with its future.”

A Forrester study commissioned by Microsoft in 2018 highlighted the importance of security. It isn’t silver pantaloons that will shape the futuristic stance of the company, it is how well it has embedded security into infrastructure, third-party providers and employees. The report makes the salient point that “digital transformation, while necessary for business success, compounds the complexity of an already tangled security threat landscape”. The business must balance the necessity of digital and its integration throughout operations with the need to embed robust security at every point along the chain. The answer? Implement security in tandem with digital transformation.

A methodical approach

“Sustainable security doesn’t evolve from a ‘plug the holes’ approach,” says Bornheim. “Nor does it benefit from pushing the proverbial square solution into the round security hole. It has to be methodically introduced across every aspect of the digital transformation process.”

Doing digital securely not only mitigates the business risk of reputational harm, but of damage done to mission-critical devices and technologies. As the organisation becomes increasingly reliant on these devices, their disruption can have serious implications. Downtime, loss of equipment, inability to perform basic business tasks – these are just some of the expensive and time-consuming problems that walk into the business alongside the cybercriminal. Just think what the repercussions could be if an employee accidentally introduced ransomware to a healthcare facility and it put all the systems on lockdown?

“One of the weakest points of entry into the business is the employee,” says Bornheim. “It’s unreasonable to expect well educated businesspeople to be aware of what a ransomware or phishing email looks like, for example. They need to be trained, there must be a robust security policy in place, and systems should be geared towards preventing these situations from happening in the first place. It is important to invest into security skills and awareness training that ensure every individual in the business, from the skilled security teams to the employees, is aware of the threat and how to protect against it.”

There is no way that the business can run below the radar of the cybercriminal. Not anymore. The statistics are increasingly concerning as well-known organisations (and not such well-known ones), big and small, fall prey to cybercriminals thanks to DDoS attacks, ransomware or other vulnerabilities in ancient systems sweated to an inch of their lives in a stressful economy. This is further challenged by the fact that all the new devices, systems, touchpoints, cloud services, and applications that enhance digital transformation are opportunities for hackers.

“The surface of attack has extended and there is a higher chance of critical system damage,” concludes Bornheim. “To add to the mix is the increasingly intelligent nature of cybercrime – cybercriminals are organised and dedicated. Digital transformation also puts the business into a constant state of flux. ‘New in, old out’. ‘Cloud this, public cloud that’. It’s a melting pot that has to be carefully managed to ensure that a digital business is built on solid and secure foundations.”

There may be a significant risk in digital transformation, but it isn’t a step that the business can avoid, not if it wants to remain relevant and grow in the current market. Bypassing digital won’t necessarily bypass the threats either. The digital transformation and security conversation often seems like the chicken and the egg dilemma, it isn’t all bad news and terrifying statistics – organisations that embed security into the bedrock of digital transformation can protect against the cyber threat. It’s not too late until it is…




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.