Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Bitcoin's wild 2025

      Bitcoin’s wild 2025

      9 December 2025
      Sim crime goes industrial as fraudsters target South Africa's digital economy

      Sim crime goes industrial as fraudsters target South Africa’s digital economy

      9 December 2025
      Nkosana Makate sees off challenge to his 'please call me' payout

      Makate sees off challenge to his ‘please call me’ payout

      9 December 2025
      Cardware Wallet aims to 'hide the blockchain' to drive mass crypto adoption - Greg van der Spuy

      Cardware Wallet aims to ‘hide the blockchain’ to drive mass crypto adoption

      9 December 2025
      Twitter brand could fly again if US start-up gets its way

      Twitter brand could fly again if US start-up gets its way

      9 December 2025
    • World
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
      Bezos unveils monster rocket: New Glenn 9x4 set to dwarf Saturn V

      Bezos unveils monster rocket: New Glenn 9×4 set to dwarf Saturn V

      21 November 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » In cybersecurity, it’s time to go on the offensive

    In cybersecurity, it’s time to go on the offensive

    By Atvance Intellect13 August 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Jayson O’Reilly

    Cybercrime statistics can easily be described as disturbing and horrifying. They reveal attacks and breaches that are expensive, intrusive, damaging and time consuming. Verizon’s research revealed that around 94% of malware was delivered by e-mail; the leading social engineering attack remains phishing; 39% of breaches were perpetrated by organised crime; and 71% were motivated by money. This landscape is further complicated by Covid-19, the sudden shift to remote working, and the introduction of new and unexpected vulnerabilities.

    According to Jayson O’Reilly, GM of AtVance Intellect: Cyber Division, organisations have spent hundreds of millions of rand on technology, security operations centres and resources but few are verifying whether the money spent is being put to good use.

    It’s critical to verify and validate any security investment on an ongoing basis to find the holes…

    “Securing the enterprise is not just about purchasing new technology and moving the dial. It’s about taking existing investments and ensuring that they are delivering results,” he said. “There are so many organisations not getting value from their security investments and suffering breaches that they could have avoided. It’s critical to verify and validate any security investment on an ongoing basis to find the holes and plug them with proactive security measures.”

    Existing security must be consistently tested, assessed and managed to ensure that vulnerabilities and unexpected risks are not creeping in, undetected. This is a common problem. An International Data Corp survey found that one of the biggest causes of cloud data breaches is misconfiguration of security. It also revealed that 80% of companies have experienced such a breach in the past 18 months and that both misconfigurations and the inability to detect access to sensitive data are two of the top threats facing business.

    Validate, verify, adapt

    “Are you more secure today than you were yesterday? How do you prove the value of the security investment if a threat actor breached your existing controls due to misconfigurations and process gaps? What vulnerabilities have arisen from the ashes of the pandemic? These are the questions that organisations should be asking,” said O’Reilly. “Checking for firewalls or antivirus protocols is how the business stayed secure in the 1980s and 1990s. It’s a different conversation now – today it’s doing the homework, validating the security is good enough to protect against cloud- and infrastructure-based attacks, and mitigating against potential fraud.”

    In short, organisations need to be as offensive as possible. They need to take a proactive approach that hunts for the holes before the hackers do. This is particularly relevant now that many organisations have moved online and into new remote working paradigms thanks to the pandemic because a multitude of unexpected and unknown vulnerabilities have emerged. According to the United Nations, there has been a 350% increase in phishing websites and there are increased concerns around how organised criminal groups are targeting and exploiting new vulnerabilities.

    “In mature environments, organisations are going on the offensive – looking for potential risks so that they know exactly what their gaps are now, rather than when they are breached,” said O’Reilly. “This is a far better approach than spending millions on security and then having to pay out for a ransomware attack and justify the costs and reasons to stakeholders. Over the past three months, leading organisations have had to pay around US$9.5-million to get the attackers to release their datasets. This is a cost few can afford at the moment.”

    The moral of the story is simple – don’t wait. Get your business cybersecurity stress test as soon as possible. If the organisation can take a look at its people, process and systems from a risk perspective and adopt an offensive strategy, then it can spend money in the right places reducing costs and increasing value in existing controls. Consistent risk-based engagements plug those pesky security gaps and formulate a far better executive discussion.

    Not all vulnerabilities are equal

    “Not all risk is created equal and not all vulnerabilities are significant,” said O’Reilly. “This means that you need to work with a partner that understands the intricacies of security and how to capture risk and vulnerability in a single and secure net that protects your company holistically.”

    Collaborating with a security-focused organisation gives companies the space and opportunity they need to ask the pressing questions that change the culture and approaches of its people and practices. Questions like: Am I more secure today than I was yesterday? How can we get the most value from our security investment? What risks and vulnerabilities are potentially impacting on my security posture? And who has access to my crown jewels, “organisational data”?

    “The most important thing for any client is to determine if the risks warrant more investment or if they can adapt existing systems and infrastructure to solve problems,” said O’Reilly. “Covid-19 has changed this more than anyone can imagine. Most companies are still trying to figure out working from home securely. But, with the right partner, and a risk-based approach, coupled with constant verification and validation, your organisation will be prepared for what lies ahead.”

    About Atvance Intellect
    Atvance Intellect helps organisations attract new customers, optimise processes, and drive sustainability, profit and growth by assisting them to leverage their intellectual capital. Bringing together all the secure data sources that a company has at its disposal, we apply data to every question, decision and action, transforming it first into information, and then into actionable intelligence to maximise business objectives and goals. Our deep understanding of the data-driven technology landscape inspires us to find new and innovative ways of unlocking value, helping you better understand your business landscape and achieve your objectives. We take all your data points and sources and turn them into assets that can translate into growing a successful business. For more, please visit Atvance Intellect’s website.

    • This promoted content was paid for by the party concerned

     



    Atvance Atvance Intellect Jayson O'Reilly
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa poised to move to level-2 lockdown
    Next Article 28 days later, load shedding returns to plague South Africa

    Related Posts

    SAPS cannot fight cybercrime on its own

    SAPS cannot fight cybercrime on its own

    12 March 2025
    CYBER1 Solutions on choosing a managed security service provider - Jayson O’Reilly and Akeel Sayed

    TCS+ | CYBER1 Solutions on choosing a managed security service provider

    15 October 2024
    Advancing Southern Africa business security in 2024 - CYBER1 Solutions' Jayson O'Reilly

    Advancing Southern Africa business security in 2024

    23 April 2024
    Company News
    LG lights up Studio V, South Korea's new virtual production powerhouse

    LG lights up Studio V, South Korea’s new virtual production powerhouse

    9 December 2025
    The best seat in the house? It's behind your Samsung Galaxy smartphone

    The best seat in the house? It’s behind your Samsung Galaxy smartphone

    9 December 2025
    Samsung Galaxy Tab A11: a smarter, sharper companion for work and play

    Samsung Galaxy Tab A11: a smarter, sharper companion for work and play

    8 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Bitcoin's wild 2025

    Bitcoin’s wild 2025

    9 December 2025
    Sim crime goes industrial as fraudsters target South Africa's digital economy

    Sim crime goes industrial as fraudsters target South Africa’s digital economy

    9 December 2025
    Nkosana Makate sees off challenge to his 'please call me' payout

    Makate sees off challenge to his ‘please call me’ payout

    9 December 2025
    Cardware Wallet aims to 'hide the blockchain' to drive mass crypto adoption - Greg van der Spuy

    Cardware Wallet aims to ‘hide the blockchain’ to drive mass crypto adoption

    9 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}