Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      How a WhatsApp bundle exposed a fault line in SA mobile

      How a WhatsApp bundle exposed a fault line in SA mobile

      19 March 2026
      Eskom must build renewables or face extinction: Mteto Nyati

      Eskom must build renewables or face extinction: Mteto Nyati

      19 March 2026
      IT Leadership Series: Cullinan Holdings CIO Ryan Porter

      IT Leadership Series: Cullinan Holdings CIO Ryan Porter

      19 March 2026
      Adobe faces fresh probe over subscription cancellation fees

      Adobe faces fresh probe over subscription cancellation fees

      19 March 2026
      Showmax Originals find a new home on DStv Stream

      Showmax Originals find a new home on DStv Stream

      19 March 2026
    • World
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
      Nvidia targets $1-trillion in AI chip sales as inference demand surges - Jensen Huang

      Nvidia targets $1-trillion in AI chip sales as inference demand surges

      17 March 2026
      Peter Thiel's secretive Rome conference draws Church attention

      Peter Thiel’s secretive Rome conference draws Church attention

      16 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Encryption: defending businesses against modern threats 

    Encryption: defending businesses against modern threats 

    Promoted | Altron Systems Integration recently hosted a round-table event on the importance of encryption. This is what happened.
    By Altron Systems Integration30 August 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Delegates at a recent Altron Systems Integration and TechCentral round table

    An organisation’s data is its most valuable asset, with publications, including the Economist, stating that it now outstrips oil as the most precious resource. Moreover, unlike in the past, data is no longer the exclusive purview of the IT department — it is incorporated into every business department.  

    Bad actors know this and are continuously honing their tools and techniques to find ways to evade the security nets and get their hands on this data. When this happens, the consequences can be catastrophic, both financially and in terms of loss of market and customer confidence. 

    This is why many entities are turning to data encryption to prevent the abuse and misuse of their data. But while this may sound simple, many are finding it challenging to manage encryption on all devices, across distributed workforces, cloud providers, local folders, and of course, networks.  

    With this in mind, Altron Systems Integration, in conjunction with TechCentral, recently hosted a round-table event, themed “Encryption: Defending the business against modern threats”.  

    Lacking in maturity 

    During the session, it emerged that encryption, although a well-accepted technology used to secure and protect critical data, is not at the maturity level one would expect in many of the organisations represented around the room.  Although encryption was incorporated into most strategies, the overall management of the keys, as well as the classification of the data, was revealed to be a common concern among these entities.  

    Representatives from Altron Systems Integration (ASI) kicked off the discussion by sharing their insight on what the company has been seeing in the data encryption space. They unpacked the basics of encryption and discussed what modern encryption tools are now capable of and why they remain a critical tool.  

    The compliance vs tech conundrum 

    There were several data-focused attendees, who said they have noticed that encryption is often tacked on as an afterthought instead of being implemented from the start, which can complicate the launch of systems when compliance insists upon it.  

    In fact, the mix of compliance versus data or technology experts at the table fuelled an interesting debate on how often the two areas are quite far apart, and how it would be worthwhile for the tech experts to incorporate compliance in their planning, and for compliance teams to better understand technology in order to close the gap between the two. It also became clear that many companies are not being proactive about compliance, and that even some of the largest corporations have too few compliance officers, which stifles innovation. This is because regulation around compliance is evolving rapidly and creeping more and more into the day-to-day running of businesses, as well as the management of business data.  

    A targeted weapon 

    While many believe encryption is a complex process, ASI shared some input on how it could simplify it. The company described encryption as a “silver bullet”, but not in the usual way the metaphor is understood: as an all-encompassing weapon, but rather as a highly targeted weapon for a specific task. After all, encryption is one of the many weapons that organisations should have in their arsenal.  

    The conversation shifted to modern, targeted threats, and how these can linger, undetected, on a company’s network for months, moving laterally, performing reconnaissance and exfiltrating data. Encryption is key to preventing this, and attendees said the more complex threats become, the more complex encryption strategies need to be.

    Breaking encryption 

    The topic of AI and quantum computing came up and was raised as a concern. Would quantum computers eventually be able to crack today’s encryption. However, this doesn’t negate encryption as an effective part of the security strategy, as not only are encryption tools evolving too, but having layers of encryption should provide enough complexity to ensure its effectiveness.  

    All agreed that encryption is a valuable and important tool that needs to be applied with care to avoid overcomplicating business practices or impacting usability.  South African businesses are accustomed to having a multi-layered security approach, and encryption is a critical part of any company’s security posture.  

    About Altron Systems Integration
    A specialist provider leveraging world-class technology and leading practices to build, implement and support sustainable ICT based business solutions which are strategically aligned, fit for purpose, cost-effective and optimised for performance. We have highly skilled, experienced professionals directed at solving business-critical customer problems through a consultative approach. We also bring our collective knowledge to every deployment engagement. From legacy integration to digital transformation, our solutions catalogue includes the full spectrum of ICT services. Few other organisations can claim the depth and breadth of the capabilities and experience we provide.   For more information, visit www.altronsystemsintegration.co.za, or follow us on Facebook, LinkedIn and Twitter. 

    • Read more articles by Altron Systems Integration on TechCentral
    • This promoted content was paid for by the party concerned 
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Altron Altron Systems Integration ASI
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleQlik talks the future of AI in data
    Next Article Strong revenue growth for CYBER1

    Related Posts

    Households still under big pressure, Altron Fintech index shows

    Households still under big pressure, Altron Fintech index shows

    13 March 2026
    The data sovereignty paradox - Altron Digital Business

    The data sovereignty paradox

    27 February 2026
    Altron flags strong year as annuity revenue tops 65%

    Altron flags strong year as annuity revenue tops 65%

    24 February 2026
    Add A Comment

    Comments are closed.

    Company News
    Africa's first Nvidia RTX Pro GPU servers have landed

    Africa’s first Nvidia RTX Pro GPU servers have landed

    19 March 2026
    How Acer Africa is bridging the digital divide through local innovation

    How Acer Africa is bridging the digital divide through local innovation

    19 March 2026
    SA is off the FATF grey list - now it's time to modernise compliance - Fenergo

    SA is off the FATF grey list – now it’s time to modernise compliance

    18 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    How a WhatsApp bundle exposed a fault line in SA mobile

    How a WhatsApp bundle exposed a fault line in SA mobile

    19 March 2026
    Eskom must build renewables or face extinction: Mteto Nyati

    Eskom must build renewables or face extinction: Mteto Nyati

    19 March 2026
    IT Leadership Series: Cullinan Holdings CIO Ryan Porter

    IT Leadership Series: Cullinan Holdings CIO Ryan Porter

    19 March 2026
    Adobe faces fresh probe over subscription cancellation fees

    Adobe faces fresh probe over subscription cancellation fees

    19 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}