Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Global crackdown on children's screen time gathers pace

      Global crackdown on children’s screen time gathers pace

      27 March 2026
      The real reason Absa wrote off R2.4-billion in software - Johnson Idesoh

      The real reason Absa wrote off R2.4-billion in software

      27 March 2026
      Big Tech's Big Tobacco moment has arrived

      Big Tech’s Big Tobacco moment has arrived

      27 March 2026
      MTN invests in AI network start-up alongside Nvidia - Mazen Mroué

      MTN invests in AI network start-up alongside Nvidia

      26 March 2026
    • World

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Are we safe? Then, now and beyond – how do we continuously derisk our businesses?

    Are we safe? Then, now and beyond – how do we continuously derisk our businesses?

    Promoted | In information security what are the questions we need to keep top of mind to ensure we are prepared beyond just the tactical?
    By Solid8 Technologies16 January 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    “The more things change, the more they stay the same.”

    This saying reminds one of the rapidly changing environment in which businesses are expected to grow.

    Whether it be the economic downturn or continuous load shedding that demands a strategy change to keep the business moving and, literally, to keep the lights on – businesses all have one thing in common: they need to adapt and change continuously to survive and thrive.

    Things are changing rapidly in information security, too, but the risks and headaches of 10 years ago are still true today. The world is getting smaller, data is pervasive and prolific, and it’s becoming harder to contain the beast unleashed by innovations such as autonomous technologies, AI and interoperable edge computing, which, coupled with changing workforce demographics, significantly impacts how corporate and personal data is shared and stored.

    Data is becoming richer and more valuable as we become more digitised and hyperconnected.

    The World Economic Forum’s latest Global Risk Report states that over the next 10 years, “widespread cybercrime and cyber insecurity [will be] a new entrant into the top 10 rankings of the most severe risks”. This is certainly not surprising given how digitised our everyday lives are becoming.

    Similarly, the opportunity behind access to business critical information at anytime and from anywhere brings with it challenges in the use and management (often monetisation of) personal data. Take for instance the biometric or facial recognition technology that is deployed across most major global cities. Friend of foe to privacy? There is a growing concern at how the extent of monitoring and analysing weighs against the need to safeguard citizens.

    Theft of confidential information is also on the rise because data is not only increasingly portable, but it’s becoming richer and more valuable as we become more digitised and hyperconnected.

    Social, cloud

    We cannot leave out the social networking element which is forcing us to rethink our policies regarding employee expectations of privacy against the need to protect the enterprise. And what about cloud computing? Previously the main concern was that to take full advantage of the benefits that cloud services bring about required us to relinquish control over our corporate data. But this is becoming less concerning with new emerging technologies such as confidential computing.

    Information security is often considered to have three components: technology, processes and people. But be warned, information security is not just an IT problem! Business leaders need to prioritise managing cyber risk and every business function must understand the risks and threats facing them and be part of the process when developing holistic approaches to information security. Humans are still the biggest threat to security. Whether due to ignorance, carelessness or improper access controls, this top threat to cybersecurity can’t be solved by training and awareness alone.

    So, what are some of the questions we need to keep top of mind and ensure we are prepared beyond just the tactical?

    • How do we identify and measure information security-related risks and compare them to other business risks?
    • How will our organisation’s business model evolve in the future, and what information security opportunities and risks will this present?
    • How will we ensure compliance with information security regulations and standards without being overwhelmed?
    • Does information security present opportunities to gain competitive advantage and have we articulated this to internal stakeholders?
    • Have we clearly identified what information is most valuable to your business and which information is most at risk?
    • Have we effectively embedded good information security behaviours into our organisation’s culture and what does this mean to the way we do business?
    • Are we aware of what events may cause our business to lose its trusted status? How are these being mitigated?
    • Do we understand the dependency we have on trading partners and do we have measures in place to ensure the security of information as it flows through our extended enterprise to third parties?

    The answers to these questions might seem embarking on a costly and never-ending endeavour. But it is key to start with the basics of understand the context of the business and the specific industry risks it needs to address and the critical assets that need to be safeguarded. This is also not a one-time exercise – every aspect of the business and its environment changes. Some the key elements include:

    • Managing exposures: Threat assessments and vulnerability scanning, documenting baseline standards and putting in effective vulnerability management practices that are automated and continuously driving improvement.
    • Building secure environments: Incorporating secure practices into key business and IT processes, implementing sound information leak management and information access management strategies for the enterprise – including data and identity management.
    • Managing incidents: Being able to effectively and efficiently investigate and respond to cyberattacks, internal fraud investigations and regulatory queries.
    • Building in resilience: Having sound business continuity plans and being able to effectively recover in the event of a disaster.

    Despite having implementing these elements, we can never be 100% secure, but we can continue to mature these elements and come close, at the very least, to minimising our risks while maximising the opportunities that await us.

    About Solid8 Technologies
    Solid8 Technologies is a value-adding distributor bringing the best of global cybersecurity software vendors and expertise that solve important security challenges and increase cyber resilience across the domains of data security, identity governance, network security, OT security and threat intelligence.

    Focused Attention. Limitless Potential. For more visit www.solid8.co.za.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Solid8 Solid8 Technologies
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWhy is e-commerce broken?
    Next Article FNB wins awards for Best Consumer Digital Bank and Best App

    Related Posts

    When CTEM, AI and a unified attack surface meet - RedRok, Solid8 Technologies

    When CTEM, AI and a unified attack surface meet

    17 March 2026
    Weak passwords cause one in five breaches - Solid8 and Specops have the fix

    Weak passwords cause one in five breaches – Solid8 and Specops have the fix

    22 October 2025
    Trust in automation: Solid8 and AlgoSec power Africa's secure digital future

    Trust in automation: Solid8 and AlgoSec power Africa’s secure digital future

    21 October 2025
    Add A Comment

    Comments are closed.

    Company News
    Durban's finance leaders are done with AI theatre - Sage Intacct

    Durban’s finance leaders are done with AI theatre

    26 March 2026
    Defend your cloud with Altron Digital Business

    Defend your cloud with Altron Digital Business

    26 March 2026
    Why most Cisco partners leave money on the table at renewal time - Westcon-Comstor

    Why most Cisco partners leave money on the table at renewal time

    25 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Anoosh Rooplal

    TCS | Anoosh Rooplal on the Post Office’s last stand

    27 March 2026
    Global crackdown on children's screen time gathers pace

    Global crackdown on children’s screen time gathers pace

    27 March 2026
    The real reason Absa wrote off R2.4-billion in software - Johnson Idesoh

    The real reason Absa wrote off R2.4-billion in software

    27 March 2026
    Big Tech's Big Tobacco moment has arrived

    Big Tech’s Big Tobacco moment has arrived

    27 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}