Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Solly Malatsi seeks out-of-court deal in TV migration fight

      15 July 2025

      South Africa’s telcos battle to monetise 5G as 4G suffices for most

      15 July 2025

      Major new electric car brand launching in South Africa

      15 July 2025

      MTN empowerment investors see ‘modest’ return as Zakhele Futhi winds up

      15 July 2025

      Eskom wants your solar system registered – but what does that actually mean?

      15 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      OpenAI to launch web browser in direct challenge to Google Chrome

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025
    • In-depth

      The 1940s visionary who imagined the Information Age

      14 July 2025

      MultiChoice is working on a wholesale overhaul of DStv

      10 July 2025

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025
    • TCS

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025
    • Opinion

      A smarter approach to digital transformation in ICT distribution

      15 July 2025

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » 6 security trends for another year of Covid

    6 security trends for another year of Covid

    By three6five19 January 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Almost every business, in some way, was forced to alter its operations due to the Covid-19 pandemic. When the first lockdown hit, flexible working was not on many businesses’ agendas, but Covid thrust them into a situation that left them no choice – do it or fall behind.

    The problem, however, is that these “situational reactions” were not adequately thought through or methodically planned, which is crucial when securing a virtual workspace.

    Now, nearly two years later, the solutions that were intended to be temporary have become permanent, cementing lax security into place.

    For more, visit www.three6five.com

    As we enter 2022 – and another year of Covid – businesses need to take a step back and re-evaluate their remote working and security strategies, especially if they’re to keep up with these trends we see in the market:

    1. The risk landscape continues to evolve

    Businesses tend to prioritise productivity and continuity over security when implementing remote and hybrid working arrangements. When employees needed quick access to data and systems, many companies based their decisions on technology and not security.

    With the enactment of the Protection of Personal Information Act (Popia) last year, and with people accessing company information from all sorts of devices and connection points, this lax approach to security – and especially mobile security and device management – will soon catch up to businesses.

    The risk landscape is bigger than it’s ever been, and a business’s obligation to secure data must become a priority.

    2. Disinvestment in multiple technologies and vendors

    The increase in Covid-driven cloud adoption has resulted in a drive to consolidate and simplify the number of solutions and vendors in the technology stack. That’s because the more tools a business has, the more complex and expensive it becomes to manage and secure the network. And the by-product of more tools is more alerts and a noisy environment that makes it easier for threats to go unnoticed.

    The Holy Grail of security ensures all tools and solutions work well together, making the sum greater than its parts. Getting this right requires a mindset shift from wanting the “best-of-breed” Magic Quadrant solutions to making technology decisions based on how well they integrate with existing infrastructure and how the addition – or removal – of a solution will reduce risk exposure and/or increase operational complexity.

    3. Behavioural analytics will do the heavy lifting

    The “alert issue” will never go away and has been a sore point for many security engineers. As we add more granular security, we increase the amount of visibility and alerting. While this is not always a bad thing, it can become challenging for an SOC to differentiate between alerts or distinguish serious threats from minor incidents.

    That’s why businesses are increasingly using behavioural analytics, supported by artificial intelligence and machine learning, to identify deviations in user behaviour in real time. Coupling this with event correlation and presenting a much simpler output and context-rich data to the security team allows them to quickly identify and action alerts and incidents that matter.

    4. ‘Zero Trust’ adoption

    The dissolution of the perimeter has made security boundaries challenging to define and protect using traditional mechanisms and concepts. Identity has become the new perimeter and a “Zero Trust” approach has gained traction as a concept and security model.

    In simple terms, Zero Trust is about removing all assumed trust and continuously evaluating and enforcing security policies in a dynamic manner against users, devices, and applications or services. With continuous behaviour assessment using advanced analytics, businesses can move away from static, ineffective security policies designed to create walled gardens towards dynamic rules that respond in real time to user and environmental behaviour.

    5. Rise of SASE

    Cloud adoption and “work from anywhere” has placed demands on network and security to scale elastically without sacrificing visibility and overall security. Furthermore, a focus on data in motion and at rest, as well as cloud application awareness, has created a market for security services and controls that can meet these needs.

    SASE, or “Secure Access Service Edge”, relies on Zero Trust as a core security principle and provides connectivity and protection mechanisms between users and cloud applications, as well as visibility and enforcement between applications.

    By consolidating numerous security and networking functions into a single managed cloud service, SASE reduces complexity and costs, enhances access and security, and enables fast and secure cloud transformation.

    6. Cyber insurance will become commonplace (we hope)

    It is likely that every business at some point will experience a variation of a cyberattack. Whether this is a denial of service against a website, or ransomware finding its way onto critical corporate data, the impact could be significant. More concerning is that these kinds of breaches have been successful against global companies that spend millions on security products and technologies and have experts working around the clock to monitor, detect and remediate breaches.

    Clearly, even the best products deployed by specialists are sometimes not enough. While each company should perform a reasonable amount of due diligence in accordance with their needs, there quickly becomes a point of diminishing returns. A trend is emerging to mitigate the risk by passing it on to someone else – in this case, cyber insurance companies.

    For a fixed cost, businesses can manage the risk presented by cyberattacks with clear aid and outcomes, which will recover damages and costs and ensure business continuity going forward. Cyber insurance, we hope, will become a common discussion when security is mentioned.

    Security first, always

    Hybrid working will become standard operating procedure for many businesses — if it hasn’t already. To support this level of flexibility, businesses need to move away from technology strategies and adopt security-first strategies to succeed in a hybrid working world.

    Knowing what to do next can be overwhelming, especially for businesses with a less mature security strategy. Find a tech-agnostic managed service provider that takes the time to understand your business and is happy to be guided by your security framework. Contact us at three6five. We’ll get the ball rolling.

    About three6five
    Three6five is a leading digital business infrastructure operations (DBIO) solutions provider. Founded by engineers in 2006, three6five understands how to apply digital technologies and how to build and manage digital networks that work best for businesses. It helps clients to identify and seize in-the-moment, business-defining outcomes, helping them to create, deploy and support the forward-thinking infrastructure they need to translate digital technology into business success. Three6five is a proud B-BBEE level-2 contributor. For more, visit www.three6five.com.

    • This promoted content was paid for by the party concerned


    Three6Five
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleOrganisations face big gaps in their Zero-Trust implementations
    Next Article South African inflation number shocks on the high side

    Related Posts

    Managed IT infrastructure done right, with three6five

    12 April 2023

    Jason Neves – from lackey to legend

    27 February 2023

    Something’s phishy: top 5 cybersecurity predictions for 2023

    15 February 2023
    Add A Comment

    Comments are closed.

    Company News

    Mental wellness at scale: how Mac fuels October Health’s mission

    15 July 2025

    Banking on LEO: Q-KON transforms financial services connectivity

    14 July 2025

    The future of business calling: Voys brings your landline to the cloud

    14 July 2025
    Opinion

    A smarter approach to digital transformation in ICT distribution

    15 July 2025

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.