Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      AI is rewriting the threat playbook - Justin Lee, Palo Alto Networks

      AI is rewriting the threat playbook

      6 May 2026
      South African private sector growth hits 44-month high

      South African private sector growth hits 44-month high

      6 May 2026
      Two South African fintechs merge to take on payday lenders - Deon Nobrega and Tamir Sacks

      Two South African fintechs merge to take on payday lenders

      6 May 2026
      Alphabet closes in on Nvidia as world's most valuable company

      Alphabet closes in on Nvidia as world’s most valuable company

      6 May 2026
      More details about Apple's AI plans emerge

      More details about Apple’s AI plans emerge

      6 May 2026
    • World
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
      Taylor Swift trademarks her voice to fight AI fakes

      Taylor Swift trademarks her voice to fight AI fakes

      28 April 2026
      DeepSeek's long-awaited V4 model enters preview

      DeepSeek’s long-awaited V4 model enters preview

      24 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » 7 steps to defend your business against cybercrime

    7 steps to defend your business against cybercrime

    By Sibusiso Sishi3 September 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Sibusiso Sishi, a cybersecurity specialist with IronSky, shares the playbook for keeping businesses safe against cyberthreats.

    Ransomware attacks have been on the increase in 2021, and so have the pay-outs criminals are demanding from the businesses they target.

    Even critical infrastructure, such as hospitals, electricity companies and water boards, have come under attack. Previously such facilities were considered “safe” as, should the infrastructure be compromised, human lives could be lost.

    The most public and consequential ransomware attack in 2021 (so far) was the one against Colonial Pipeline in the US, which shut down the company’s billing and halted the pipeline’s operation on the US east coast. The criminals stole nearly 100GB of data and threatened to release this information if they were not paid 75 bitcoin (R53-million at the time of writing). The criminals eventually made off with a pay-out of millions.

    Learn more at ironsky.co.za

    Closer to home, Transnet had over a terabyte of personal data, financial reports and other documents ransomed, according to news reports.

    Taking charge

    There are easy wins that can be implemented in organisations to improve their security posture, making it harder for criminals to breach their defences.

    1. Know your ICT network internally and externally
    Shadow IT and legacy systems placed in production and then forgotten about are a real risk to organisations.
    When employees bring their home devices onto the network or install applications without approval from the IT department, they can introduce security risks to through data leaks and compliance violations, or worse: infected devices or infected software. Shadow IT is not only devices and software on workstations but can also be cloud-based software such as Dropbox, Google Docs, Skype, e-mailing services and other third-party cloud solutions. Monitoring the network and understanding what users are bringing into the organisation or installing, and what third-party services users are utilising should be investigated and known.

    Legacy systems can introduce vulnerabilities and risks to the organisation, especially if they have been forgotten by the IT team. Identifying these, and starting a process to replace them, should be prioritised. If those systems cannot be replaced, the monitoring of ingress and egress traffic to these systems should be implemented, as well as access control lists to limit which systems can interact with these legacy systems.

    2. Implement a vulnerability management lifecycle
    Implementing a vulnerability management lifecycle is vital for the organisation as it can assist in identifying security weaknesses before they lead to a breach. Part of the vulnerability management lifecycle is to have an updated IT asset list and to be continuously scanning for new devices on the network for vulnerabilities, misconfigurations and threats.

    Another aspect of vulnerability management includes validating the urgency and impact of each vulnerability based on various risk factors and responding to the critical threats swiftly.

    3. Implement multi-factor authentication on all externally facing portals
    Users, willingly or unwillingly, create weak passwords for accounts, or share their credentials across multiple social media or third-party websites. The risk comes in when these third-party websites get breached, and those credentials get exposed.

    These credentials can be “replayed” across the Internet to see what other systems they have access to. By implementing multi-factor authentication — either by SMS or app (more secure) — there is another layer in the defence of the organisation to stop the criminal from gaining access. It helps, too, if users create weak passwords.

    4. Don’t give users local admin rights on their workstations
    Local administrator rights should be removed from users’ workstations. Ransomware thrives when it has access to a workstation where the user has local administrator rights as the ransomware obtains the same rights as the user and can therefore download and install other tools.

    Additionally, users who have local administrator rights may download malware and install it, as they do not know what is safe and unsafe. By removing the user as a local administrator on their workstation, companies can help keep the computer in compliance with the policy, such as what software may be installed and what shouldn’t.

    According to BeyondTrust’s Microsoft vulnerabilities report for 2021, “enforcing least privilege and removing admin rights eliminated 56% of critical vulnerabilities”. Fewer vulnerabilities mean fewer opportunities for attackers to compromise your network.

    5. Install Laps
    The “Local Administrator Password Solution” (Laps) provides management of local account passwords for domain-joined computers. Microsoft Laps works by randomising each local administrator password of all Windows endpoints. Laps is a great mitigation tool against lateral movement and privilege escalation as each Windows endpoint has a unique local administrator password that if compromised cannot be used to gain access to other Windows endpoints. The management of these passwords is done entirely through Active Directory components.

    6. Perform a compliance review on OS for workstation and server, and harden
    The goal of systems hardening is to further protect your organisation by reducing vulnerabilities in your applications, systems and IT infrastructure. Compliance reviews help to ensure that your workstations and servers are aligned to best practice as set out by the vendor, and that default configurations, that may hamper the security of the workstation or server, have been disabled.

    7. Ensure all service account passwords are long and complex and disable interactive logon
    Often, once the service account has its password set, it is forgotten. Frequently, IT staff do not know the password (which has likely never been changed since it was set many years ago). Attackers hunt for service accounts, as their passwords may be weak and these accounts have access to critical servers. Once the credentials of the service account have been compromised, we find that the service account has interactive logon, allowing attackers to have remote desktop sessions on servers.

    Ensure all service account passwords are long and complex, disable interactive logon and monitor the usage of service accounts.

    Everyone has the inalienable right to own and control their data. IronSky is an advisory service made to protect that right.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Colonial Pipeline IronSky Sibusiso Sishi Transnet
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleStandard Bank throws down the gauntlet to M-Pesa
    Next Article Crypto watch | Polkadot, the sleeping giant?

    Related Posts

    Green shoots are breaking through South Africa's economic static

    Green shoots are breaking through South Africa’s economic static

    8 December 2025
    More good news for South Africa

    More good news for South Africa

    19 November 2024
    South Africa secures World Bank backing for grid overhaul

    The extraordinary cost of bailing out South Africa’s SOEs

    16 October 2024
    Company News
    How to set up a smart home in South Africa - Samsung SmartThings

    How to set up a smart home in South Africa

    6 May 2026
    Why Africa is uniquely placed to leapfrog the world on cybersecurity - Armand Kruger NEC XON

    Why Africa is uniquely placed to leapfrog the world on cybersecurity

    6 May 2026
    We're hiring: TechCentral is looking for technology journalists

    We’re hiring: TechCentral is looking for technology journalists

    6 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    AI is rewriting the threat playbook - Justin Lee, Palo Alto Networks

    AI is rewriting the threat playbook

    6 May 2026
    South African private sector growth hits 44-month high

    South African private sector growth hits 44-month high

    6 May 2026
    How to set up a smart home in South Africa - Samsung SmartThings

    How to set up a smart home in South Africa

    6 May 2026
    Why Africa is uniquely placed to leapfrog the world on cybersecurity - Armand Kruger NEC XON

    Why Africa is uniquely placed to leapfrog the world on cybersecurity

    6 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}