Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      SABC Plus to flight Microsoft AI training videos

      SABC Plus to flight Microsoft AI training videos

      30 January 2026
      Fibre industry consolidation in KZN

      Fibre industry consolidation in KZN

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      What ordinary South Africans really think of AI

      What ordinary South Africans really think of AI

      30 January 2026
      Tim Cook flags memory crunch as AI chips starve smartphones

      Tim Cook flags memory crunch as AI chips starve smartphones

      30 January 2026
    • World
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
      SpaceX IPO may be largest in history

      SpaceX IPO may be largest in history

      28 January 2026
      Nvidia throws AI at the weather

      Nvidia throws AI at weather forecasting

      27 January 2026
      Debate erupts over value of in-flight Wi-Fi

      Debate erupts over value of in-flight Wi-Fi

      26 January 2026
      Intel takes another hit - Intel CEO Lip-Bu Tan. Laure Andrillon/Reuters

      Intel takes another hit

      23 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » 7 steps to defend your business against cybercrime

    7 steps to defend your business against cybercrime

    By Sibusiso Sishi3 September 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Sibusiso Sishi, a cybersecurity specialist with IronSky, shares the playbook for keeping businesses safe against cyberthreats.

    Ransomware attacks have been on the increase in 2021, and so have the pay-outs criminals are demanding from the businesses they target.

    Even critical infrastructure, such as hospitals, electricity companies and water boards, have come under attack. Previously such facilities were considered “safe” as, should the infrastructure be compromised, human lives could be lost.

    The most public and consequential ransomware attack in 2021 (so far) was the one against Colonial Pipeline in the US, which shut down the company’s billing and halted the pipeline’s operation on the US east coast. The criminals stole nearly 100GB of data and threatened to release this information if they were not paid 75 bitcoin (R53-million at the time of writing). The criminals eventually made off with a pay-out of millions.

    Learn more at ironsky.co.za

    Closer to home, Transnet had over a terabyte of personal data, financial reports and other documents ransomed, according to news reports.

    Taking charge

    There are easy wins that can be implemented in organisations to improve their security posture, making it harder for criminals to breach their defences.

    1. Know your ICT network internally and externally
    Shadow IT and legacy systems placed in production and then forgotten about are a real risk to organisations.
    When employees bring their home devices onto the network or install applications without approval from the IT department, they can introduce security risks to through data leaks and compliance violations, or worse: infected devices or infected software. Shadow IT is not only devices and software on workstations but can also be cloud-based software such as Dropbox, Google Docs, Skype, e-mailing services and other third-party cloud solutions. Monitoring the network and understanding what users are bringing into the organisation or installing, and what third-party services users are utilising should be investigated and known.

    Legacy systems can introduce vulnerabilities and risks to the organisation, especially if they have been forgotten by the IT team. Identifying these, and starting a process to replace them, should be prioritised. If those systems cannot be replaced, the monitoring of ingress and egress traffic to these systems should be implemented, as well as access control lists to limit which systems can interact with these legacy systems.

    2. Implement a vulnerability management lifecycle
    Implementing a vulnerability management lifecycle is vital for the organisation as it can assist in identifying security weaknesses before they lead to a breach. Part of the vulnerability management lifecycle is to have an updated IT asset list and to be continuously scanning for new devices on the network for vulnerabilities, misconfigurations and threats.

    Another aspect of vulnerability management includes validating the urgency and impact of each vulnerability based on various risk factors and responding to the critical threats swiftly.

    3. Implement multi-factor authentication on all externally facing portals
    Users, willingly or unwillingly, create weak passwords for accounts, or share their credentials across multiple social media or third-party websites. The risk comes in when these third-party websites get breached, and those credentials get exposed.

    These credentials can be “replayed” across the Internet to see what other systems they have access to. By implementing multi-factor authentication — either by SMS or app (more secure) — there is another layer in the defence of the organisation to stop the criminal from gaining access. It helps, too, if users create weak passwords.

    4. Don’t give users local admin rights on their workstations
    Local administrator rights should be removed from users’ workstations. Ransomware thrives when it has access to a workstation where the user has local administrator rights as the ransomware obtains the same rights as the user and can therefore download and install other tools.

    Additionally, users who have local administrator rights may download malware and install it, as they do not know what is safe and unsafe. By removing the user as a local administrator on their workstation, companies can help keep the computer in compliance with the policy, such as what software may be installed and what shouldn’t.

    According to BeyondTrust’s Microsoft vulnerabilities report for 2021, “enforcing least privilege and removing admin rights eliminated 56% of critical vulnerabilities”. Fewer vulnerabilities mean fewer opportunities for attackers to compromise your network.

    5. Install Laps
    The “Local Administrator Password Solution” (Laps) provides management of local account passwords for domain-joined computers. Microsoft Laps works by randomising each local administrator password of all Windows endpoints. Laps is a great mitigation tool against lateral movement and privilege escalation as each Windows endpoint has a unique local administrator password that if compromised cannot be used to gain access to other Windows endpoints. The management of these passwords is done entirely through Active Directory components.

    6. Perform a compliance review on OS for workstation and server, and harden
    The goal of systems hardening is to further protect your organisation by reducing vulnerabilities in your applications, systems and IT infrastructure. Compliance reviews help to ensure that your workstations and servers are aligned to best practice as set out by the vendor, and that default configurations, that may hamper the security of the workstation or server, have been disabled.

    7. Ensure all service account passwords are long and complex and disable interactive logon
    Often, once the service account has its password set, it is forgotten. Frequently, IT staff do not know the password (which has likely never been changed since it was set many years ago). Attackers hunt for service accounts, as their passwords may be weak and these accounts have access to critical servers. Once the credentials of the service account have been compromised, we find that the service account has interactive logon, allowing attackers to have remote desktop sessions on servers.

    Ensure all service account passwords are long and complex, disable interactive logon and monitor the usage of service accounts.

    Everyone has the inalienable right to own and control their data. IronSky is an advisory service made to protect that right.

    • This promoted content was paid for by the party concerned


    Colonial Pipeline IronSky Sibusiso Sishi Transnet
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleStandard Bank throws down the gauntlet to M-Pesa
    Next Article Crypto watch | Polkadot, the sleeping giant?

    Related Posts

    Green shoots are breaking through South Africa's economic static

    Green shoots are breaking through South Africa’s economic static

    8 December 2025
    More good news for South Africa

    More good news for South Africa

    19 November 2024
    Eskom's next crisis, and why resolving it will be require 'tough trade-offs'

    The extraordinary cost of bailing out South Africa’s SOEs

    16 October 2024
    Company News
    Huawei turns 25 in South Africa, celebrates with major device discounts

    Huawei turns 25 in South Africa, celebrates with major device discounts

    30 January 2026
    Phishing has not disappeared, but it has grown up - KnowBe4

    Phishing has not disappeared, but it has grown up

    30 January 2026
    Smartphone affordability: South Africa's new economic divide - PayJoy

    Smartphone affordability: South Africa’s new economic divide

    29 January 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Huawei turns 25 in South Africa, celebrates with major device discounts

    Huawei turns 25 in South Africa, celebrates with major device discounts

    30 January 2026
    SABC Plus to flight Microsoft AI training videos

    SABC Plus to flight Microsoft AI training videos

    30 January 2026
    Phishing has not disappeared, but it has grown up - KnowBe4

    Phishing has not disappeared, but it has grown up

    30 January 2026
    Fibre industry consolidation in KZN

    Fibre industry consolidation in KZN

    30 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}