Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Telkom to hike mobile and fixed tariffs from 1 April - Lunga Siyo

      Telkom to hike mobile and fixed tariffs from 1 April

      6 March 2026
      GSMA warns geopolitics could split global mobile standards - Ralph Mupita

      GSMA warns geopolitics could split global mobile standards

      6 March 2026
      iStore prices MacBook Neo at R11 999 in South Africa

      iStore prices MacBook Neo at R11 999 in South Africa

      6 March 2026
      Meta to allow rival AI chatbots on WhatsApp amid EU pressure

      Meta to allow rival AI chatbots on WhatsApp amid EU pressure

      6 March 2026
      MultiChoice pulls the plug on Showmax

      MultiChoice pulls the plug on Showmax

      5 March 2026
    • World
      OpenAI secures $840-billion valuation in latest funding round

      OpenAI secures $840-billion valuation in latest funding round

      1 March 2026

      Stripe mulling bid for PayPal: report

      25 February 2026
      Xbox chief Phil Spencer retires from Microsoft

      Xbox chief Phil Spencer retires from Microsoft

      22 February 2026
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026
    • Opinion
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » IT services » 6 security trends for another year of Covid

    6 security trends for another year of Covid

    By three6five19 January 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Almost every business, in some way, was forced to alter its operations due to the Covid-19 pandemic. When the first lockdown hit, flexible working was not on many businesses’ agendas, but Covid thrust them into a situation that left them no choice – do it or fall behind.

    The problem, however, is that these “situational reactions” were not adequately thought through or methodically planned, which is crucial when securing a virtual workspace.

    Now, nearly two years later, the solutions that were intended to be temporary have become permanent, cementing lax security into place.

    For more, visit www.three6five.com

    As we enter 2022 – and another year of Covid – businesses need to take a step back and re-evaluate their remote working and security strategies, especially if they’re to keep up with these trends we see in the market:

    1. The risk landscape continues to evolve

    Businesses tend to prioritise productivity and continuity over security when implementing remote and hybrid working arrangements. When employees needed quick access to data and systems, many companies based their decisions on technology and not security.

    With the enactment of the Protection of Personal Information Act (Popia) last year, and with people accessing company information from all sorts of devices and connection points, this lax approach to security – and especially mobile security and device management – will soon catch up to businesses.

    The risk landscape is bigger than it’s ever been, and a business’s obligation to secure data must become a priority.

    2. Disinvestment in multiple technologies and vendors

    The increase in Covid-driven cloud adoption has resulted in a drive to consolidate and simplify the number of solutions and vendors in the technology stack. That’s because the more tools a business has, the more complex and expensive it becomes to manage and secure the network. And the by-product of more tools is more alerts and a noisy environment that makes it easier for threats to go unnoticed.

    The Holy Grail of security ensures all tools and solutions work well together, making the sum greater than its parts. Getting this right requires a mindset shift from wanting the “best-of-breed” Magic Quadrant solutions to making technology decisions based on how well they integrate with existing infrastructure and how the addition – or removal – of a solution will reduce risk exposure and/or increase operational complexity.

    3. Behavioural analytics will do the heavy lifting

    The “alert issue” will never go away and has been a sore point for many security engineers. As we add more granular security, we increase the amount of visibility and alerting. While this is not always a bad thing, it can become challenging for an SOC to differentiate between alerts or distinguish serious threats from minor incidents.

    That’s why businesses are increasingly using behavioural analytics, supported by artificial intelligence and machine learning, to identify deviations in user behaviour in real time. Coupling this with event correlation and presenting a much simpler output and context-rich data to the security team allows them to quickly identify and action alerts and incidents that matter.

    4. ‘Zero Trust’ adoption

    The dissolution of the perimeter has made security boundaries challenging to define and protect using traditional mechanisms and concepts. Identity has become the new perimeter and a “Zero Trust” approach has gained traction as a concept and security model.

    In simple terms, Zero Trust is about removing all assumed trust and continuously evaluating and enforcing security policies in a dynamic manner against users, devices, and applications or services. With continuous behaviour assessment using advanced analytics, businesses can move away from static, ineffective security policies designed to create walled gardens towards dynamic rules that respond in real time to user and environmental behaviour.

    5. Rise of SASE

    Cloud adoption and “work from anywhere” has placed demands on network and security to scale elastically without sacrificing visibility and overall security. Furthermore, a focus on data in motion and at rest, as well as cloud application awareness, has created a market for security services and controls that can meet these needs.

    SASE, or “Secure Access Service Edge”, relies on Zero Trust as a core security principle and provides connectivity and protection mechanisms between users and cloud applications, as well as visibility and enforcement between applications.

    By consolidating numerous security and networking functions into a single managed cloud service, SASE reduces complexity and costs, enhances access and security, and enables fast and secure cloud transformation.

    6. Cyber insurance will become commonplace (we hope)

    It is likely that every business at some point will experience a variation of a cyberattack. Whether this is a denial of service against a website, or ransomware finding its way onto critical corporate data, the impact could be significant. More concerning is that these kinds of breaches have been successful against global companies that spend millions on security products and technologies and have experts working around the clock to monitor, detect and remediate breaches.

    Clearly, even the best products deployed by specialists are sometimes not enough. While each company should perform a reasonable amount of due diligence in accordance with their needs, there quickly becomes a point of diminishing returns. A trend is emerging to mitigate the risk by passing it on to someone else – in this case, cyber insurance companies.

    For a fixed cost, businesses can manage the risk presented by cyberattacks with clear aid and outcomes, which will recover damages and costs and ensure business continuity going forward. Cyber insurance, we hope, will become a common discussion when security is mentioned.

    Security first, always

    Hybrid working will become standard operating procedure for many businesses — if it hasn’t already. To support this level of flexibility, businesses need to move away from technology strategies and adopt security-first strategies to succeed in a hybrid working world.

    Knowing what to do next can be overwhelming, especially for businesses with a less mature security strategy. Find a tech-agnostic managed service provider that takes the time to understand your business and is happy to be guided by your security framework. Contact us at three6five. We’ll get the ball rolling.

    About three6five
    Three6five is a leading digital business infrastructure operations (DBIO) solutions provider. Founded by engineers in 2006, three6five understands how to apply digital technologies and how to build and manage digital networks that work best for businesses. It helps clients to identify and seize in-the-moment, business-defining outcomes, helping them to create, deploy and support the forward-thinking infrastructure they need to translate digital technology into business success. Three6five is a proud B-BBEE level-2 contributor. For more, visit www.three6five.com.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Three6Five
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleOrganisations face big gaps in their Zero-Trust implementations
    Next Article South African inflation number shocks on the high side

    Related Posts

    Managed IT infrastructure done right, with three6five

    12 April 2023

    Jason Neves – from lackey to legend

    27 February 2023

    Something’s phishy: top 5 cybersecurity predictions for 2023

    15 February 2023
    Add A Comment

    Comments are closed.

    Company News
    'You'll want a piece of it': Citroën teases Basalt SUV Coupé

    ‘You’ll want a piece of it’: Citroën teases Basalt SUV Coupé

    6 March 2026
    From Linux chaos to AI precision: the maturation of LSD Open - Neil White

    From Linux chaos to AI precision: the maturation of LSD Open

    5 March 2026
    The voice gap holding back South Africa's Microsoft Teams users - Rob Lith Telviva

    The voice gap holding back South Africa’s Microsoft Teams users

    5 March 2026
    Opinion
    The AI fraud crisis your bank is not ready for - Andries Maritz

    The AI fraud crisis your bank is not ready for

    18 February 2026
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Telkom to hike mobile and fixed tariffs from 1 April - Lunga Siyo

    Telkom to hike mobile and fixed tariffs from 1 April

    6 March 2026
    GSMA warns geopolitics could split global mobile standards - Ralph Mupita

    GSMA warns geopolitics could split global mobile standards

    6 March 2026
    iStore prices MacBook Neo at R11 999 in South Africa

    iStore prices MacBook Neo at R11 999 in South Africa

    6 March 2026
    'You'll want a piece of it': Citroën teases Basalt SUV Coupé

    ‘You’ll want a piece of it’: Citroën teases Basalt SUV Coupé

    6 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}