Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      The little-known company disrupting Eskom’s monopoly

      16 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      Chief sub-editor wanted – help shape South African tech media

      16 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Learn how other South African organisations protect their cyber assets

    Learn how other South African organisations protect their cyber assets

    By Ryan Ramawoothar27 October 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    When it comes to cybersecurity, you’re either in the crosshairs or you’re already bleeding.

    In the past 12 months, 33% of organisations worldwide have experienced a ransomware attack or breach that locked down their systems or data, according to International Data Corp’s latest survey results.

    I know that being a CIO or CISO today is no joke.

    On one side, you’re faced with a security skills shortage of one to four million people worldwide, depending who you talk to. Budgets are strained. Threats surround you. There have always been regulatory requirements but never so many nor so stringent as now. The complexities of systems, services, applications and identities, in hybrid cloud and on-premises environments, rise towards space like a rocket made from a billion parts, every one of them a split-second from exploding in fiery doom.

    Railed against you are hyper-resourced criminal syndicates who attract competent and skilled system administrators and engineers in teams, sometimes rumoured to be state backed, offering you little recourse and no protection if you do fall into their sights. Or, more specifically, the sights of their automated minions who connect them with your unwary users.

    Status quo must go

    The numerous cybersecurity point solutions that many organisations have and the way they’re set up today offer little hope for salvation. Often disconnected, they provide scant protection.

    Simply identifying who is responsible for securing cyber assets in cloud environments — the organisation or the cloud provider — can be challenging enough, particularly considering the ease and speed of spinning up these services, applications and system.

    To change your fortunes

    But that’s why so many CISOs dream of consolidating the tools and responsibilities into a single pane of cybersecurity glass, defined by a framework, aligned with the business strategy, uniting regulatory compliance and advanced protection, with one throat to throttle. They know if they get it right, with support for their Popia journey and a firm understanding of roles and responsibilities, they secure their full spectrum of cyber assets, networks, users and data.

    It’s a process that works better in a framework. Hardening IT resources, identifying weak points and creating resilient environments, including peripherals, e-mail, the Web, endpoints, assessing risks and vulnerabilities to formulate strategies that ameliorate risk, are how we create sustainable, surround cybersecurity.

    Since every organisation has a unique combination of network, systems, data and ways of working, each solution to the challenge of securing their environments must be tailored uniquely to them. It is important to use the right best-of-breed solutions, integrated by experienced engineers to optimise data curation, minimise exposure and establish resilience.

    Estate-wide surround security

    Gaining a single pane of glass into cybersecurity and compliance across the entire estate, particularly activities that require third-party tooling, ensures that we get rapid threat identification and alerts, remediation and effective reporting to support continuous improvement.

    With so many moving parts feeding the complexity, as well as intensely resourced, invisible actors threatening us from a multitude of channels, it’s easy to feel overwhelmed. It’s all the more reason to organise, comprehensively.

    For more information, contact us today

    • Ryan Ramawoothar is head of software for First Technology
    • Visit First Technology on LinkedIn
    • This promoted content was paid for by the party concerned


    First Technology First Technology Group Ryan Ramawoothar
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleMicrosoft poised to unseat Apple as world’s most valuable company – again
    Next Article Facebook should relax: Nobody serves old people better

    Related Posts

    From spreadsheets to superpowers – how AI is transforming the world

    4 December 2024

    TCS+ | WIOCC and 2Africa: providing an alternative to national long-distance fibre

    1 July 2024

    FirstNet leverages WIOCC 2Africa cable for unprecedented connectivity

    22 May 2024
    Add A Comment

    Comments are closed.

    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.