In terms of risk versus reward, cybercrime is a highly lucrative industry. Research from Atlas VPN suggests that cyberattacks generate more than $1.5 trillion in revenue each year, and this figure is growing. This indicates that incidents of cybercrime are on the increase globally, and South Africa is no exception. In fact, South Africa has become a very attractive target, and the damage done by cyberattacks is beginning to add up. We need to shift our focus from reacting to attacks when they happen to actively working to prevent them.
South Africa – a vulnerable and profitable target
The South African technology landscape is an interesting dichotomy that makes it vulnerable to attack by cybercriminals. On one hand, the market is mature enough that many large international organizations have a local presence, so there are many lucrative potential targets for attack. On the other hand, our technology landscape and skills base is not mature enough to protect against all of the possible threats and vulnerabilities.
According to IBM Cost of a Data Breach Report 2019, the average cost of a data breach in South Africa is at R36.5 million, which ranks us at number 7 of 16 countries. The reality is that this is not a new scenario, but the frequency of incidents is on the increase and the high-profile nature of attacks is growing. In 2019 we saw several prominent ransomware attacks on local government and utility providers, and the attacks continue in 2020, with a recent attack on vehicle recovery organization Tracker.
Aside from the disruption to service that successful breaches cause, there are numerous other ramifications that can be extremely costly. This includes damage to and theft and destruction of data, lost productivity, money being stolen, the cost of actually recovering from the attack, and the intangible cost of reputational damage that a breach causes.
Prevention is better than cure
There is no doubt that South African organizations are and will continue to be targets of cybercriminal activity, and it is past time to take the threat seriously. It is essential to implement as many controls as possible to prevent an attack, rather than waiting for an attack to occur and then attempting to mitigate the damage.
It is important to focus on the boundaries of an organization with effective perimeter security, which should include mobile devices, endpoints, networks, and so on. While the cloud increases complexity by blurring the physical boundaries of an organization, it does not change the principles of security.
Basic controls that need to be in place include a perimeter firewall, endpoint protection, and antivirus, among others. Critically, these controls need to be patched and updated regularly to ensure they continue to provide adequate protection against the latest security threats. Email security is also essential to minimize exposure to infected links and attachments, phishing scams, and other malicious gambits perpetrated over this medium.
However, threats do not always come from outside of an organization and breaches may occur through human error without the involvement of any malicious intent. Users may accidentally compromise a network, for example by connecting a mobile device to an unsecured network at a coffee shop, where they pick up a virus, and then connecting to the corporate network where the virus can now gain access.
Education must always form a significant component of any threat prevention solution. Above all, as people we need to start acknowledging that protection solutions are not just random hoops to jump through that make life difficult. They are put into place for a specific reason and are critical to our security.
Being proactive is key to minimising damage
In the past the approach has often been to reactively detect breaches and then try and clean up the mess. The nature of the threat, however, and the increasing cost of such an endeavour, make this approach ill-advised in the current and future landscape. It is far less costly to prevent an attack from getting through in the first place, and new technologies are now available to help us do just this. Technology also enables breaches to be detected much more swiftly, so that the damage can be mitigated.
Proper risk assessments, vulnerability scans and penetration testing need to form part of a comprehensive strategy, and they need to be undertaken on a regular basis. It is no longer enough to annually assess security, because the threats change with much greater frequency. Testing should in fact be aligned with patch cycles to make sure that every time something changes, security controls remain tight.
The threat landscape is constantly evolving, but cybercrime is not going to go away. South African organisations have a history of underestimating the potential risk, and this is an attitude that needs to change.
Finding Solutions To SA’s Brain Drain
Impala Rustenburg Sponsors 30 New Bursaries For The Tapologo Home-based Care Training Programme
Cross-continent Support Of International Governments, Global Tech World At Inaugural GITEX Africa
Institut Pasteur de Dakar And Mastercard Foundation Announce Unprecedented Partnership To Expand Workforce For Vaccine Manufacturing In Africa
Excellence In Healthcare Honoured At The Prestigious 8th Annual Titanium Awards
Winter Is For Friendcations
vivo Communications Research Institute Introduces New Technology Vision, Hosts 5G Technology Dialogue With Global Partners
Making LPG Accessible To Underserved Communities Is One Of The Ways To Tackle South Africa’s Energy Crisis
The Art Of A Total Reward Strategy In The War For Talent
Stay Ahead Of The Game: How AI Can Help SMB Retailers Compete
HEALA Urges SA Public To Comment On Draft Food Labelling Regulations
Envision Racing And Cartoon Network EMEA Join Forces To Help Kids Become Climate Champions