Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Vula Medical named as South Africa's 2025 app of the year

      Vula Medical named as South Africa’s 2025 app of the year

      5 December 2025
      Netflix, Warner Bros talks raise fresh headaches for MultiChoice

      Netflix, Warner Bros talks raise fresh headaches for MultiChoice

      5 December 2025
      Big Microsoft 365 price increases coming next year

      Big Microsoft price increases coming next year

      5 December 2025
      Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

      Vodacom to take control of Safaricom in R36-billion deal

      4 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • World
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
      Bezos unveils monster rocket: New Glenn 9x4 set to dwarf Saturn V

      Bezos unveils monster rocket: New Glenn 9×4 set to dwarf Saturn V

      21 November 2025
      Tech shares turbocharged by Nvidia's stellar earnings

      Tech shares turbocharged by stellar Nvidia earnings

      20 November 2025
      Config file blamed for Cloudflare meltdown that disrupted the web

      Config file blamed for Cloudflare meltdown that disrupted the web

      19 November 2025
    • In-depth
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
      Why smart glasses keep failing - no, it's not the tech - Mark Zuckerberg

      Why smart glasses keep failing – it’s not the tech

      19 October 2025
      BYD to blanket South Africa with megawatt-scale EV charging network - Stella Li

      BYD to blanket South Africa with megawatt-scale EV charging network

      16 October 2025
    • TCS
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025
    • Opinion
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
      How South Africa's broken Rica system fuels murder and mayhem - Farhad Khan

      How South Africa’s broken Rica system fuels murder and mayhem

      10 November 2025
      South Africa's AI data centre boom risks overloading a fragile grid - Paul Colmer

      South Africa’s AI data centre boom risks overloading a fragile grid

      30 October 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » South African businesses must rethink cyber risk in 2025

    South African businesses must rethink cyber risk in 2025

    Promoted | The rapid advancement of AI and machine learning has reshaped the global cybersecurity landscape.
    By Arctic Wolf30 January 2025
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    South African businesses must rethink cyber risk in 2025 - Arctic WolfIn the last two years, the rapid advancement of artificial intelligence and machine learning has reshaped the global cybersecurity landscape. Threat actors can now carry out highly sophisticated attacks with minimal skill and effort, aided by AI-powered tools.

    This evolution has pushed South African businesses to rethink their cybersecurity approach. Both business leaders and employees play a critical role in defending against cyberthreats, often without fully realising the extent of their responsibility.

    The stakes are particularly high in South Africa, where cybercrime is expected to cost the economy R2.2-billion annually. With cyber risk reaching unprecedented levels, reducing human risk in 2025 will be critical for entities trying to build resilience.

    This means fuelling a strong security culture through ongoing employee training. Although cultivating this mindset takes time – particularly for large, decentralised teams – improving cybersecurity awareness is achievable for anyone, regardless of their technical background.

    The AI-driven cyber arms race

    Cybersecurity has historically been a game of cat and mouse, with defenders racing to patch vulnerabilities and block emerging threats. However, the introduction of AI-powered cyberattacks has redefined this arms race, upping the ante for local companies.

    Today, malicious actors and defenders rely on machine learning models – whether to craft sophisticated phishing campaigns or power advanced security platforms. The gap between attackers and defenders has narrowed dangerously, largely because malefactors are not constrained by rules or regulations when developing offensive technologies.

    In South Africa, AI-enabled scams have become more prevalent, with local businesses reporting a rise in attacks involving deepfake technology and automated social engineering. Towards the end of 2023, a well-known South African news presenter became the target of bogus news stories and fake advertisements, where “she” appeared to endorse products or promote get-rich-quick schemes. Soon, she fell victim to deepfaking, a practice that uses AI to manipulate images, video, and audio.

    What’s more alarming is that creating deepfakes no longer requires advanced technical skills – freely available software like FaceSwap and ZaoApp makes it accessible to virtually anyone.

    These tactics exploit trust, a vital component of any organisation. For example, social engineering attacks like the massive MGM Casino and MOVEit breaches in 2023 illustrate how human reconnaissance combined with technical exploits can cause significant damage. Locally, the high rate of phishing attacks in South Africa highlights the vulnerability of employees – even senior leaders – to social engineering.

    People: the Achilles heel in cybersecurity

    While technology plays a key role in combating cyberthreats, human error remains a major vulnerability. Research by Arctic Wolf indicates that nearly two-thirds of IT executives globally have fallen victim to phishing, underscoring that this is not just a problem for new employees – it’s also a leadership issue. In South Africa, common human errors such as reusing credentials, bypassing multifactor authentication (MFA) and clicking on malicious links place firms at considerable risk.

    The key to mitigating human risk lies in creating a culture where cybersecurity is everyone’s responsibility. People are highly susceptible to having their natural biases exploited, so employees must feel comfortable reporting suspicious activity and know exactly how to respond to potential threats. South African entities, often targeted due to their growing digital footprint, must put security awareness training tailored to their specific risk environment at the top priority list.

    Bridging the disconnect between confidence and preparedness

    Despite the rise in cyberattacks, many organisations overestimate their preparedness. For instance, although 64% of IT leaders have clicked on a phishing link, 80% reported that they were “confident” their company wouldn’t fall for a phishing attack.

    This is a massive disconnect that South African businesses must address by implementing mandatory security measures, such as MFA, password managers and virtual private networks. These tools provide an added layer of protection but must be coupled with regular training to ensure employees understand their importance.

    South Africa’s path to cyber resilience

    In addition to technological defences, South African organisations should strengthen their cybersecurity posture by:

    • Enhancing reporting mechanisms: Staff members must know how to report suspicious activity and verify identities when interacting with colleagues or third parties.
    • Adopting zero-trust models: A zero-trust approach sees that all users, inside or outside the network, are continuously verified before being granted access.
    • Implementing regular simulations: Phishing simulations and tabletop exercises can help entities identify vulnerabilities and improve response times.
    • Building trust: A foundation of trust between employees and leadership is critical. Workers should feel empowered to voice security concerns without fear of reprisal, as quick action is vital to containing threats.

    South Africa’s cybercrime landscape also requires firms to address local challenges, such as limited access to cybersecurity resources in small and medium-sized enterprises and the rise of shadow AI, or unsanctioned tools that increase a business’s attack surface. Local firms can boost their resilience in an increasingly hostile cyber environment by prioritising a cohesive cybersecurity strategy that covers technological and human vulnerabilities.

    The harsh reality is that in 2025, cyber risk will only continue to grow, particularly in regions where the digital transformation is outpacing security investments. From background checks to phishing defences, the opportunities for bad actors to exploit gaps in human and technical defences are plentiful.

    For organisations to stay one step ahead of their adversaries, they must ensure that every individual – from entry-level employees to the C-suite – understands their role in maintaining cybersecurity.

    • The author, Dan Schiappa, is chief product and services officer at Arctic Wolf
    • Read more articles by Arctic Wolf on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Arctic Wolf Labs’ 2025 cybersecurity predictions – an evolving threat landscape



    Arctic Wolf Dan Schiappa
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGoogle’s Africa reseller network grows as organisations think Digicloud for Google Cloud
    Next Article Microsoft, Meta defend hefty AI spending after DeepSeek stuns tech world

    Related Posts

    The double-edged sword of AI in cybersecurity - Arctic Wolf

    The double-edged sword of AI in cybersecurity

    29 September 2025
    TCS+ | Arctic Wolf on cybersecurity in the age of AI

    TCS+ | Arctic Wolf on cybersecurity in the age of AI

    25 August 2025
    Remote monitoring tools: IT lifesavers or hacker gateways? Arctic Wolf

    Remote monitoring tools: IT lifesavers or hacker gateways?

    7 July 2025
    Add A Comment

    Comments are closed.

    Company News
    Beat the summer heat with Samsung's WindFree air conditioners

    Beat the summer heat with Samsung’s WindFree air conditioners

    5 December 2025
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Telcos are sitting on a data gold mine - but few know what do with it - Phillip du Plessis

    Telcos are sitting on a data gold mine – but few know what do with it

    4 December 2025
    Opinion
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025
    Zero Carbon Charge founder Joubert Roux

    The energy revolution South Africa can’t afford to miss

    20 November 2025
    It's time for a new approach to government IT spend in South Africa - Richard Firth

    It’s time for a new approach to government IT spend in South Africa

    19 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Vula Medical named as South Africa's 2025 app of the year

    Vula Medical named as South Africa’s 2025 app of the year

    5 December 2025
    Beat the summer heat with Samsung's WindFree air conditioners

    Beat the summer heat with Samsung’s WindFree air conditioners

    5 December 2025
    Netflix, Warner Bros talks raise fresh headaches for MultiChoice

    Netflix, Warner Bros talks raise fresh headaches for MultiChoice

    5 December 2025
    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}