Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Britehouse breaks free from NTT Data

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025

      OpenAI to launch web browser in direct challenge to Google Chrome

      10 July 2025

      The satellite broadband operators taking on Starlink

      9 July 2025

      Yaccarino out: Musk’s handpicked CEO quits X suddenly

      9 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025

      Jony Ive’s first AI gadget could be … a pen

      30 June 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025

      TCS+ | First Distribution on data governance in hybrid cloud environments

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Secure Access: Business Confidential

    Secure Access: Business Confidential

    By Tony Walt15 December 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    The author, Tony Walt, argues that the attack surface has increased significantly as a result of work-from-home measures

    The global pandemic has almost completely changed traditional working models and approaches. Even those organisations resistant to cloud, digital and remote working have had to flex and adapt to the requirements of social and legal distancing regulations.

    The new workforce emerging from the rubble of the year wants the freedom to leverage both digital and physical environments to get the job done. Approaches have changed, methodologies have shifted, and statistics point to the rise of the blended workplace where people work from a mix of remote and office spaces. However, as companies and employees evolve and adapt to the new world of work, there is a critical need to embed security into this evolution from the outset.

    For more information, please visit this website

    The introduction of remote working, be it from home or any location that’s not the office, has also introduced vulnerabilities. Are all employees using devices issued by their organisations with the relevant controls, or are some using their own devices because pandemic restrictions limited their access? Who has access to these devices? The security risk isn’t just that family members could accidentally introduce malware or download unsafe content, but that patch and vulnerability management isn’t being implemented correctly. Whether a device is company owned or part of a bring your own device (BYOD) strategy, organisations still need to ensure that policies around patches, security and access are rigorously maintained.

    Organisations still need to ensure that policies around patches, security and access are rigorously maintained

    The problem in the pandemic is that IT departments were thrust into remote working conditions as rapidly as everyone else. Patch management, security, access, remote management – these concerns had to be addressed remotely, often while adapting to new systems and solutions cobbled together at the last minute. Juggling remote employees learning how to work from kitchens and bar stools while keeping the company lights on and ensuring systems were capable of handling the stress meant that IT teams have been under immense pressure to keep the business running.

    Time is now

    But the time to embed security is now. The attack surface has increased significantly, spreading outwards alongside a distributed workforce that could be easily contained in the past. A thousand people suddenly working from a thousand locations instead of the one that they had before. That alone captures the magnitude of the change with regards to traffic flows alone.

    Threat hunters have been taking advantage of the chaos – phishing attacks have increased, malware is on the rise and ransomware continues to plague even the most sophisticated systems. People are lured into clicking links that have been designed to prey on the fear factor, using terms such as Covid-19 and vaccination. And because they are external to the office, people are more vulnerable and susceptible than in the past.

    Addressing these risks to ensure secure access starts with a security awareness training programme for all employees. This will provide them with insight into the types of attack that would be aimed at them, how to identify attacks, and understanding around the risks. It will ensure that the standards and basic controls around e-mail hygiene and online behaviour are clearly understood, and that passwords are to the right levels for remote access and information sharing. It’s also worth implementing additional controls at the infrastructure level that ensure firewalls and access, among other factors, are absolutely secure. These can be further enhanced by undertaking a cybersecurity assessment designed to identify vulnerabilities and evaluate the controls that are in place. In addition, threat monitoring and management has to become a priority. Often, issues aren’t caught and compromises missed due to the complexities introduced by the virtual workplace. Organisations need the insights provided by threat analysis so that they can make the right security decisions.

    The problem is time and skills. Few organisations have the capacity, tools or experience to monitor secure access 24/7 with the right levels of control. Yet they have to constantly monitor for threats and compromise to ensure that they mitigate risk for governance and compliance. This can be resolved by working with a partner that can take care of the three Ps – platform, people and process. A security management partner can not only take care of security systems across e-mail, scanning, behaviour and risk, but can support an organisation’s security in terms of governance and compliance. With the right partner, the business can look at the broader picture while the security partner ensures that cybersecurity is never neglected, always on, and capable of mitigating the most significant threats.

    The world of work will likely remain in flux for the foreseeable future as organisations adapt to ongoing uncertainty. This means that security will have to constantly change and adapt to match. It’s a challenge, but one that can be mitigated with the right partner and posture.

    For more information, please visit this website.

    • This promoted content was paid for by the party concerned


    Dimension Data Tony Walt
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleAll eyes on bitcoin this December: What’s next?
    Next Article SpaceX in talks for new funds at up to $92-billion valuation: report

    Related Posts

    Britehouse breaks free from NTT Data

    10 July 2025

    Former Dimension Data boss joins iOCO board

    20 March 2025

    NTT Data appoints new managing executive for South Africa

    3 March 2025
    Company News

    AI in project management: a new era of efficiency and transformation

    10 July 2025

    Samsung unfolds the future with thinnest, lightest Galaxy Z Fold yet

    9 July 2025

    Huawei supercharges South African SMEs with over 20 new eKit products

    9 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.