Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Troubling questions over South African internet infrastructure attacks

      Troubling questions over South African internet infrastructure attacks

      19 May 2026
      Eskom threatens to cut power to Joburg

      Eskom threatens to cut power to Joburg

      19 May 2026
      DDoS extortionists 'carpet bomb' South African internet hosts - Warwick Ward-Cox

      Extortionists ‘carpet bomb’ South African internet hosts

      19 May 2026

      Extortion fears as DDoS attacks hit SA internet infrastructure

      19 May 2026
      Setback for Vodacom in Kenya - Shameel Joosub

      Setback for Vodacom in Kenya

      19 May 2026
    • World
      Vatican confronts the age of artificial intelligence. Edgar Beltrán/The Pillar 

      Vatican confronts the age of artificial intelligence

      19 May 2026
      The walkout that could hit every laptop and AI server - Samsung

      The walkout that could hit every laptop and AI server

      18 May 2026
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

      TCS+ | The Up&Up Group on the hidden cost of AI

      13 May 2026
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
    • Opinion
      AI won't fix your culture - it will expose it - Jackie Kennedy

      AI won’t fix your culture – it will expose it

      19 May 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CM Telecom
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » In cybersecurity, it’s time to go on the offensive

    In cybersecurity, it’s time to go on the offensive

    By Atvance Intellect13 August 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Jayson O’Reilly

    Cybercrime statistics can easily be described as disturbing and horrifying. They reveal attacks and breaches that are expensive, intrusive, damaging and time consuming. Verizon’s research revealed that around 94% of malware was delivered by e-mail; the leading social engineering attack remains phishing; 39% of breaches were perpetrated by organised crime; and 71% were motivated by money. This landscape is further complicated by Covid-19, the sudden shift to remote working, and the introduction of new and unexpected vulnerabilities.

    According to Jayson O’Reilly, GM of AtVance Intellect: Cyber Division, organisations have spent hundreds of millions of rand on technology, security operations centres and resources but few are verifying whether the money spent is being put to good use.

    It’s critical to verify and validate any security investment on an ongoing basis to find the holes…

    “Securing the enterprise is not just about purchasing new technology and moving the dial. It’s about taking existing investments and ensuring that they are delivering results,” he said. “There are so many organisations not getting value from their security investments and suffering breaches that they could have avoided. It’s critical to verify and validate any security investment on an ongoing basis to find the holes and plug them with proactive security measures.”

    Existing security must be consistently tested, assessed and managed to ensure that vulnerabilities and unexpected risks are not creeping in, undetected. This is a common problem. An International Data Corp survey found that one of the biggest causes of cloud data breaches is misconfiguration of security. It also revealed that 80% of companies have experienced such a breach in the past 18 months and that both misconfigurations and the inability to detect access to sensitive data are two of the top threats facing business.

    Validate, verify, adapt

    “Are you more secure today than you were yesterday? How do you prove the value of the security investment if a threat actor breached your existing controls due to misconfigurations and process gaps? What vulnerabilities have arisen from the ashes of the pandemic? These are the questions that organisations should be asking,” said O’Reilly. “Checking for firewalls or antivirus protocols is how the business stayed secure in the 1980s and 1990s. It’s a different conversation now – today it’s doing the homework, validating the security is good enough to protect against cloud- and infrastructure-based attacks, and mitigating against potential fraud.”

    In short, organisations need to be as offensive as possible. They need to take a proactive approach that hunts for the holes before the hackers do. This is particularly relevant now that many organisations have moved online and into new remote working paradigms thanks to the pandemic because a multitude of unexpected and unknown vulnerabilities have emerged. According to the United Nations, there has been a 350% increase in phishing websites and there are increased concerns around how organised criminal groups are targeting and exploiting new vulnerabilities.

    “In mature environments, organisations are going on the offensive – looking for potential risks so that they know exactly what their gaps are now, rather than when they are breached,” said O’Reilly. “This is a far better approach than spending millions on security and then having to pay out for a ransomware attack and justify the costs and reasons to stakeholders. Over the past three months, leading organisations have had to pay around US$9.5-million to get the attackers to release their datasets. This is a cost few can afford at the moment.”

    The moral of the story is simple – don’t wait. Get your business cybersecurity stress test as soon as possible. If the organisation can take a look at its people, process and systems from a risk perspective and adopt an offensive strategy, then it can spend money in the right places reducing costs and increasing value in existing controls. Consistent risk-based engagements plug those pesky security gaps and formulate a far better executive discussion.

    Not all vulnerabilities are equal

    “Not all risk is created equal and not all vulnerabilities are significant,” said O’Reilly. “This means that you need to work with a partner that understands the intricacies of security and how to capture risk and vulnerability in a single and secure net that protects your company holistically.”

    Collaborating with a security-focused organisation gives companies the space and opportunity they need to ask the pressing questions that change the culture and approaches of its people and practices. Questions like: Am I more secure today than I was yesterday? How can we get the most value from our security investment? What risks and vulnerabilities are potentially impacting on my security posture? And who has access to my crown jewels, “organisational data”?

    “The most important thing for any client is to determine if the risks warrant more investment or if they can adapt existing systems and infrastructure to solve problems,” said O’Reilly. “Covid-19 has changed this more than anyone can imagine. Most companies are still trying to figure out working from home securely. But, with the right partner, and a risk-based approach, coupled with constant verification and validation, your organisation will be prepared for what lies ahead.”

    About Atvance Intellect
    Atvance Intellect helps organisations attract new customers, optimise processes, and drive sustainability, profit and growth by assisting them to leverage their intellectual capital. Bringing together all the secure data sources that a company has at its disposal, we apply data to every question, decision and action, transforming it first into information, and then into actionable intelligence to maximise business objectives and goals. Our deep understanding of the data-driven technology landscape inspires us to find new and innovative ways of unlocking value, helping you better understand your business landscape and achieve your objectives. We take all your data points and sources and turn them into assets that can translate into growing a successful business. For more, please visit Atvance Intellect’s website.

    • This promoted content was paid for by the party concerned

     

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Atvance Atvance Intellect Jayson O'Reilly
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa poised to move to level-2 lockdown
    Next Article 28 days later, load shedding returns to plague South Africa

    Related Posts

    SAPS cannot fight cybercrime on its own

    SAPS cannot fight cybercrime on its own

    12 March 2025
    CYBER1 Solutions on choosing a managed security service provider - Jayson O’Reilly and Akeel Sayed

    TCS+ | CYBER1 Solutions on choosing a managed security service provider

    15 October 2024
    CYBER1 Solutions' Jayson O'Reilly

    Advancing Southern Africa business security in 2024

    23 April 2024
    Company News
    Digital Parks Africa expands global network reach with Cogent

    Digital Parks Africa expands global network reach with Cogent

    19 May 2026
    Why the security operations centre is now a boardroom issue - Chris Norton Kaspersky

    Why the security operations centre is now a boardroom issue

    18 May 2026
    Netstar brings coding and robotics to inner-city Joburg - Collin Govender, Altron Group chief operating officer; Leona Pienaar, MES CEO; Marisa Jansen van Vuuren, Altron Group chief marketing officer; Innocent Mabusela, Jozi My Jozi CEO; and Warren Mande, incoming Netstar MD

    Netstar brings coding and robotics to inner-city Joburg

    18 May 2026
    Opinion
    AI won't fix your culture - it will expose it - Jackie Kennedy

    AI won’t fix your culture – it will expose it

    19 May 2026
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Troubling questions over South African internet infrastructure attacks

    Troubling questions over South African internet infrastructure attacks

    19 May 2026
    Eskom threatens to cut power to Joburg

    Eskom threatens to cut power to Joburg

    19 May 2026
    DDoS extortionists 'carpet bomb' South African internet hosts - Warwick Ward-Cox

    Extortionists ‘carpet bomb’ South African internet hosts

    19 May 2026

    Extortion fears as DDoS attacks hit SA internet infrastructure

    19 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}