Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Batteries to move to the centre of South Africa's energy transition

      Batteries to move to the centre of South Africa’s energy transition

      22 January 2026
      South African telescope solves mystery of 'doomed' giant star

      South African telescope solves mystery of ‘doomed’ giant star

      22 January 2026
      Why South Africa is missing the tech minerals boom

      Why South Africa is missing the tech minerals boom

      22 January 2026
      AI is eating the world's memory - and we're all going to pay the price

      AI is eating the world’s memory – and we’re all going to pay the price

      22 January 2026
      New details emerge about Apple's big Siri overhaul

      New details emerge about Apple’s big Siri overhaul

      22 January 2026
    • World
      Taiwan, US strike strategic AI and chip supply-chain pact - TSMC

      Taiwan, US strike strategic AI and chip supply-chain pact

      20 January 2026
      Wikipedia moves to monetise AI giants' reliance on its content

      Wikipedia moves to monetise AI giants’ reliance on its content

      15 January 2026
      Visa moves to plug stablecoins into the global payments system

      Visa moves to plug stablecoins into the global payments system

      15 January 2026
      Oracle sued as bondholders allege AI debt plans were hidden - Larry Ellison

      Oracle sued as bondholders allege AI debt plans were hidden

      15 January 2026
      Activists call for X, Grok to removed from app stores - Elon Musk

      Activists call for X, Grok to removed from app stores

      14 January 2026
    • In-depth
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      DStv dodges channel blackout in last-minute deal with Warner Bros

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
    • TCS

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels: S1E1 - 'William, Prince of Wheels'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
    • Opinion
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » IT services » 6 security trends for another year of Covid

    6 security trends for another year of Covid

    By three6five19 January 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Almost every business, in some way, was forced to alter its operations due to the Covid-19 pandemic. When the first lockdown hit, flexible working was not on many businesses’ agendas, but Covid thrust them into a situation that left them no choice – do it or fall behind.

    The problem, however, is that these “situational reactions” were not adequately thought through or methodically planned, which is crucial when securing a virtual workspace.

    Now, nearly two years later, the solutions that were intended to be temporary have become permanent, cementing lax security into place.

    For more, visit www.three6five.com

    As we enter 2022 – and another year of Covid – businesses need to take a step back and re-evaluate their remote working and security strategies, especially if they’re to keep up with these trends we see in the market:

    1. The risk landscape continues to evolve

    Businesses tend to prioritise productivity and continuity over security when implementing remote and hybrid working arrangements. When employees needed quick access to data and systems, many companies based their decisions on technology and not security.

    With the enactment of the Protection of Personal Information Act (Popia) last year, and with people accessing company information from all sorts of devices and connection points, this lax approach to security – and especially mobile security and device management – will soon catch up to businesses.

    The risk landscape is bigger than it’s ever been, and a business’s obligation to secure data must become a priority.

    2. Disinvestment in multiple technologies and vendors

    The increase in Covid-driven cloud adoption has resulted in a drive to consolidate and simplify the number of solutions and vendors in the technology stack. That’s because the more tools a business has, the more complex and expensive it becomes to manage and secure the network. And the by-product of more tools is more alerts and a noisy environment that makes it easier for threats to go unnoticed.

    The Holy Grail of security ensures all tools and solutions work well together, making the sum greater than its parts. Getting this right requires a mindset shift from wanting the “best-of-breed” Magic Quadrant solutions to making technology decisions based on how well they integrate with existing infrastructure and how the addition – or removal – of a solution will reduce risk exposure and/or increase operational complexity.

    3. Behavioural analytics will do the heavy lifting

    The “alert issue” will never go away and has been a sore point for many security engineers. As we add more granular security, we increase the amount of visibility and alerting. While this is not always a bad thing, it can become challenging for an SOC to differentiate between alerts or distinguish serious threats from minor incidents.

    That’s why businesses are increasingly using behavioural analytics, supported by artificial intelligence and machine learning, to identify deviations in user behaviour in real time. Coupling this with event correlation and presenting a much simpler output and context-rich data to the security team allows them to quickly identify and action alerts and incidents that matter.

    4. ‘Zero Trust’ adoption

    The dissolution of the perimeter has made security boundaries challenging to define and protect using traditional mechanisms and concepts. Identity has become the new perimeter and a “Zero Trust” approach has gained traction as a concept and security model.

    In simple terms, Zero Trust is about removing all assumed trust and continuously evaluating and enforcing security policies in a dynamic manner against users, devices, and applications or services. With continuous behaviour assessment using advanced analytics, businesses can move away from static, ineffective security policies designed to create walled gardens towards dynamic rules that respond in real time to user and environmental behaviour.

    5. Rise of SASE

    Cloud adoption and “work from anywhere” has placed demands on network and security to scale elastically without sacrificing visibility and overall security. Furthermore, a focus on data in motion and at rest, as well as cloud application awareness, has created a market for security services and controls that can meet these needs.

    SASE, or “Secure Access Service Edge”, relies on Zero Trust as a core security principle and provides connectivity and protection mechanisms between users and cloud applications, as well as visibility and enforcement between applications.

    By consolidating numerous security and networking functions into a single managed cloud service, SASE reduces complexity and costs, enhances access and security, and enables fast and secure cloud transformation.

    6. Cyber insurance will become commonplace (we hope)

    It is likely that every business at some point will experience a variation of a cyberattack. Whether this is a denial of service against a website, or ransomware finding its way onto critical corporate data, the impact could be significant. More concerning is that these kinds of breaches have been successful against global companies that spend millions on security products and technologies and have experts working around the clock to monitor, detect and remediate breaches.

    Clearly, even the best products deployed by specialists are sometimes not enough. While each company should perform a reasonable amount of due diligence in accordance with their needs, there quickly becomes a point of diminishing returns. A trend is emerging to mitigate the risk by passing it on to someone else – in this case, cyber insurance companies.

    For a fixed cost, businesses can manage the risk presented by cyberattacks with clear aid and outcomes, which will recover damages and costs and ensure business continuity going forward. Cyber insurance, we hope, will become a common discussion when security is mentioned.

    Security first, always

    Hybrid working will become standard operating procedure for many businesses — if it hasn’t already. To support this level of flexibility, businesses need to move away from technology strategies and adopt security-first strategies to succeed in a hybrid working world.

    Knowing what to do next can be overwhelming, especially for businesses with a less mature security strategy. Find a tech-agnostic managed service provider that takes the time to understand your business and is happy to be guided by your security framework. Contact us at three6five. We’ll get the ball rolling.

    About three6five
    Three6five is a leading digital business infrastructure operations (DBIO) solutions provider. Founded by engineers in 2006, three6five understands how to apply digital technologies and how to build and manage digital networks that work best for businesses. It helps clients to identify and seize in-the-moment, business-defining outcomes, helping them to create, deploy and support the forward-thinking infrastructure they need to translate digital technology into business success. Three6five is a proud B-BBEE level-2 contributor. For more, visit www.three6five.com.

    • This promoted content was paid for by the party concerned


    Three6Five
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleOrganisations face big gaps in their Zero-Trust implementations
    Next Article South African inflation number shocks on the high side

    Related Posts

    Managed IT infrastructure done right, with three6five

    12 April 2023

    Jason Neves – from lackey to legend

    27 February 2023

    Something’s phishy: top 5 cybersecurity predictions for 2023

    15 February 2023
    Add A Comment

    Comments are closed.

    Company News
    Domains.co.za launches South Africa's first homegrown Link in Bio tool

    Domains.co.za launches South Africa’s first homegrown Link in Bio tool

    22 January 2026
    Trends that are shaping the use of AI to improve CX - Telviva

    Trends shaping the use of AI to improve CX

    22 January 2026
    The tech transformation of sports betting

    The tech transformation of sports betting

    21 January 2026
    Opinion
    AI moves from pilots to production in South African companies - Nazia Pillay SAP

    AI moves from pilots to production in South African companies

    20 January 2026
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Batteries to move to the centre of South Africa's energy transition

    Batteries to move to the centre of South Africa’s energy transition

    22 January 2026
    South African telescope solves mystery of 'doomed' giant star

    South African telescope solves mystery of ‘doomed’ giant star

    22 January 2026
    Why South Africa is missing the tech minerals boom

    Why South Africa is missing the tech minerals boom

    22 January 2026
    AI is eating the world's memory - and we're all going to pay the price

    AI is eating the world’s memory – and we’re all going to pay the price

    22 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}