Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Nissan doubles down on South Africa despite plant uncertainty

      11 July 2025

      MultiChoice is working on a wholesale overhaul of DStv

      10 July 2025

      Spam call epidemic: operators say their hands are tied

      10 July 2025

      Britehouse unit breaks free from NTT Data

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025

      TCS+ | First Distribution on data governance in hybrid cloud environments

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » News » Surge in data security breaches: report

    Surge in data security breaches: report

    By Regardt van der Berg26 May 2014
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Andrew Kirkland
    Andrew Kirkland

    In its 2014 Global Security Report, information security specialist Trustwave estimates that investigations into security breaches increased by 53,6% last year compared to 2012. The data was gathered from 24 countries.

    Trustwave Africa director Andrew Kirkland says many organisations don’t have the skills to address information security adequately, and many businesses simply don’t take security seriously enough.

    The 2014 Global Security Report says 45% of all data theft incidents in 2013 involved non-payment card data, although payment card data still tops the list of data compromised. Non-payment card data includes financial credentials, personally identifiable information and other customer and personal records.

    The report also indicates that there has been a 33% increase in the theft of sensitive and confidential data.

    “The landscape for criminals is broadening. This does not mean that the theft of credit card information is decreasing, it just means that criminals are now looking at other options — and their options are growing,” Kirkland says.

    The delivery method for most security breaches still involves criminals using e-mail to gain access. According to the 2014 Global Security Report, 59% of malicious spam used attachments infused with malware, while 41% used malicious links.

    Criminals relied heavily on Java applets, with 78% of exploits detected taking advantage of vulnerabilities in Java. Spam made up 70% of inbound mail, although malicious spam fell by five percentage points in 2013, according to Trustwave’s report. The top three spam malware subject lines were “Some important information is missing”, “Bank Statement. Please read”, and “Important — payment overdue”.

    The report says weak passwords opened the door for the initial intrusion in 31% of compromises investigated by Trustwave in 2013.

    Kirkland says that in South Africa, there isn’t much information about data breaches in the payment card space or other sensitive data being stolen because South African law does not make it mandatory for companies to divulge such information. “South African companies still try to protect their reputations by keeping such information to themselves.”

    But Kirkland says breaches are commonplace in South Africa, who says the African continent more broadly is vulnerable. “We are a target because we are seen as an emerging market. Africa is playing catch up all the time, including when it comes to matters related to security.”  — © 2014 NewsCentral Media



    Andrew Kirkland Trustwave
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleAnd now for the ministry of propaganda
    Next Article Strong revenue growth at Neotel

    Related Posts

    Spike in identity theft

    20 July 2015

    How the Dexter malware works

    17 October 2013

    Joint action needed on cyber crime

    23 May 2013
    Company News

    NEC XON welcomes HPE acquisition of Juniper Networks

    11 July 2025

    AI in project management: a new era of efficiency and transformation

    10 July 2025

    Samsung unfolds the future with thinnest, lightest Galaxy Z Fold yet

    9 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.