Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

      South Africa’s draft AI policy is a bureaucrat’s dream

      10 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
      5G expected to reshape South Africa's wireless broadband market

      5G expected to reshape South Africa’s wireless broadband market

      10 April 2026
      Warning that South Africa's digital competitiveness is in retreat

      Warning that South Africa’s digital competitiveness is in retreat

      10 April 2026
      South Africa's biggest banks are lining up behind Optasia - Salvador Anglada

      South Africa’s biggest banks are lining up behind Optasia

      10 April 2026
    • World
      Anthropic mulls building its own AI chips

      Anthropic mulls building its own AI chips

      10 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Encryption: defending businesses against modern threats 

    Encryption: defending businesses against modern threats 

    Promoted | Altron Systems Integration recently hosted a round-table event on the importance of encryption. This is what happened.
    By Altron Systems Integration30 August 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Delegates at a recent Altron Systems Integration and TechCentral round table

    An organisation’s data is its most valuable asset, with publications, including the Economist, stating that it now outstrips oil as the most precious resource. Moreover, unlike in the past, data is no longer the exclusive purview of the IT department — it is incorporated into every business department.  

    Bad actors know this and are continuously honing their tools and techniques to find ways to evade the security nets and get their hands on this data. When this happens, the consequences can be catastrophic, both financially and in terms of loss of market and customer confidence. 

    This is why many entities are turning to data encryption to prevent the abuse and misuse of their data. But while this may sound simple, many are finding it challenging to manage encryption on all devices, across distributed workforces, cloud providers, local folders, and of course, networks.  

    With this in mind, Altron Systems Integration, in conjunction with TechCentral, recently hosted a round-table event, themed “Encryption: Defending the business against modern threats”.  

    Lacking in maturity 

    During the session, it emerged that encryption, although a well-accepted technology used to secure and protect critical data, is not at the maturity level one would expect in many of the organisations represented around the room.  Although encryption was incorporated into most strategies, the overall management of the keys, as well as the classification of the data, was revealed to be a common concern among these entities.  

    Representatives from Altron Systems Integration (ASI) kicked off the discussion by sharing their insight on what the company has been seeing in the data encryption space. They unpacked the basics of encryption and discussed what modern encryption tools are now capable of and why they remain a critical tool.  

    The compliance vs tech conundrum 

    There were several data-focused attendees, who said they have noticed that encryption is often tacked on as an afterthought instead of being implemented from the start, which can complicate the launch of systems when compliance insists upon it.  

    In fact, the mix of compliance versus data or technology experts at the table fuelled an interesting debate on how often the two areas are quite far apart, and how it would be worthwhile for the tech experts to incorporate compliance in their planning, and for compliance teams to better understand technology in order to close the gap between the two. It also became clear that many companies are not being proactive about compliance, and that even some of the largest corporations have too few compliance officers, which stifles innovation. This is because regulation around compliance is evolving rapidly and creeping more and more into the day-to-day running of businesses, as well as the management of business data.  

    A targeted weapon 

    While many believe encryption is a complex process, ASI shared some input on how it could simplify it. The company described encryption as a “silver bullet”, but not in the usual way the metaphor is understood: as an all-encompassing weapon, but rather as a highly targeted weapon for a specific task. After all, encryption is one of the many weapons that organisations should have in their arsenal.  

    The conversation shifted to modern, targeted threats, and how these can linger, undetected, on a company’s network for months, moving laterally, performing reconnaissance and exfiltrating data. Encryption is key to preventing this, and attendees said the more complex threats become, the more complex encryption strategies need to be.

    Breaking encryption 

    The topic of AI and quantum computing came up and was raised as a concern. Would quantum computers eventually be able to crack today’s encryption. However, this doesn’t negate encryption as an effective part of the security strategy, as not only are encryption tools evolving too, but having layers of encryption should provide enough complexity to ensure its effectiveness.  

    All agreed that encryption is a valuable and important tool that needs to be applied with care to avoid overcomplicating business practices or impacting usability.  South African businesses are accustomed to having a multi-layered security approach, and encryption is a critical part of any company’s security posture.  

    About Altron Systems Integration
    A specialist provider leveraging world-class technology and leading practices to build, implement and support sustainable ICT based business solutions which are strategically aligned, fit for purpose, cost-effective and optimised for performance. We have highly skilled, experienced professionals directed at solving business-critical customer problems through a consultative approach. We also bring our collective knowledge to every deployment engagement. From legacy integration to digital transformation, our solutions catalogue includes the full spectrum of ICT services. Few other organisations can claim the depth and breadth of the capabilities and experience we provide.   For more information, visit www.altronsystemsintegration.co.za, or follow us on Facebook, LinkedIn and Twitter. 

    • Read more articles by Altron Systems Integration on TechCentral
    • This promoted content was paid for by the party concerned 
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Altron Altron Systems Integration ASI
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleQlik talks the future of AI in data
    Next Article Strong revenue growth for CYBER1

    Related Posts

    Defend your cloud with Altron Digital Business

    Defend your cloud with Altron Digital Business

    26 March 2026
    MTN and Vodacom dwarf South Africa's listed tech sector

    MTN and Vodacom dwarf South Africa’s listed tech sector

    20 March 2026
    Households still under big pressure, Altron Fintech index shows

    Households still under big pressure, Altron Fintech index shows

    13 March 2026
    Add A Comment

    Comments are closed.

    Company News
    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    10 April 2026
    What South African parents look for in an online school - CambriLearn

    What South African parents look for in an online school

    9 April 2026
    Modernising legacy systems - without the downtime - BBD Software

    Modernising legacy systems – without the downtime

    9 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

    South Africa’s draft AI policy is a bureaucrat’s dream

    10 April 2026
    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Warning that South Africa's digital competitiveness is in retreat

    Warning that South Africa’s digital competitiveness is in retreat

    10 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}