Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      SpaceX acquires xAI in record-breaking deal

      SpaceX acquires xAI in record-breaking deal

      3 February 2026
      Haier plants its flag in South Africa

      Haier plants its flag in South Africa

      2 February 2026
      Microsoft's winning formula is starting to fray - Satya Nadella

      Microsoft’s winning formula may be starting to fray

      2 February 2026
      Meet the CIO | Inside the JSE's tech engine with CIO Tebalo Tsoaeli

      Meet the CIO | Inside the JSE’s tech engine with CIO Tebalo Tsoaeli

      2 February 2026
      Crypto has gone mainstream - will South African regulators catch up in 2026? - Marius Reitz

      Crypto has gone mainstream – will South African regulators catch up in 2026?

      2 February 2026
    • World
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
      SpaceX IPO may be largest in history

      SpaceX IPO may be largest in history

      28 January 2026
      Nvidia throws AI at the weather

      Nvidia throws AI at weather forecasting

      27 January 2026
      Debate erupts over value of in-flight Wi-Fi

      Debate erupts over value of in-flight Wi-Fi

      26 January 2026
      Intel takes another hit - Intel CEO Lip-Bu Tan. Laure Andrillon/Reuters

      Intel takes another hit

      23 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » The art of securing the crown jewels of modern businesses: data protection and governance

    The art of securing the crown jewels of modern businesses: data protection and governance

    By Microsoft27 September 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The role that data plays in businesses today cannot be underestimated. In fact, data is the crown jewels of modern companies because of its potential to act as a differentiator that turns insights into innovation and volume into value.

    However, discovering and managing data is challenging. Data is exploding: 90% of all data ever created has been made in the past two years, and the volume of data that exists is expected to double every two years – and likely even more quickly as the pace of digital transformation continues to pick up.

    This is because it is created, stored and shared everywhere, particularly in an increasingly remote and hybrid work environment. This includes numerous platforms, apps and sources like employees, partners, customers and even bots encompassing e-mails, documents, records, and both structured and unstructured data.

    Research shows that 88% of organisations no longer have the confidence to detect and prevent loss of sensitive data

    Protecting data in this complex and diverse new paradigm is even more challenging – and research shows that 88% of organisations no longer have the confidence to detect and prevent loss of sensitive data.

    It makes sense that data protection is a top security priority for business and security leaders in South Africa, with an IDC cybersecurity survey commissioned by Microsoft finding that 66% of businesses in the country already make use of data protection technologies like data loss prevention software.

    But while business leaders know that information protection and governance is a top priority and needs to lie at the heart of security for organisations today – especially as more businesses move to the cloud or adopt a hybrid computing approach – do they truly understand what it means to actually protect this data and why their computing environment needs to be underpinned by end-to-end security to protect and govern data wherever it lives and travels?

    Know your data. Protect your data. Prevent data loss. Govern your data

    Businesses need to understand their data landscape and identify important data across their computing environment, be it in the cloud, a hybrid approach or on-premise to protect and govern data wherever it lives and travels effectively. Key to the ability to do this is the concept of: “Know your data. Protect your data. Prevent data loss. Govern your data.”

    The first step is going back to the basics in terms of understanding different categories of data, including personal, sensitive or confidential data.

    The next step is evaluating what types of data business units and the organisation as a whole already have as well as what data it is generating, and how these tie into the data needs and overall business strategy of the organisation.

    Access control and management is emerging as one of the key measures that businesses and security leaders can use to protect an organisation’s data

    This understanding and classification of data then needs to be combined with protective measures such as applying encryption, access restrictions and visual markings such as adding sensitivity labels to documents.

    Access control and management is emerging as one of the key measures that businesses and security leaders can use to protect an organisation’s data. Increasingly, this means providing conditional, just-in-time and just-enough access to give people only what they need, for as long as they need it.

    It is a driving force behind the “Zero Trust” principle, which more and more businesses are adopting as their main security strategy. “Zero Trust” means trusting no individual or system, needing to explicity verify their identity, using least-privilege access to give them access only to what they need, for as long as they need it, and always assuming breach.

    The sweet spot between data and security: compliance

    Access control is also one of the vital parts of compliance with data regulations, which are in place not only to protect an individual’s right to privacy but also to guard what may be the source code of the organisation – in line with both a company’s internal policies as well as specific legislation. This is even more essential now that South Africa’s Protection of Personal Information Act (Popia) has come into full effect. Popia aims to regulate how organisations generate, store, manage, use and process personal data.

    As such, governing data requires automatically retaining, deleting and storing data and records in a compliant manner. Currently, South African organisations are finding this a challenge: The IDC research showed that 25% of businesses failed to meet privacy regulations such as Popia or GDPR in the past 12 months.

    Nearly half – 48% – of organisations are working to achieve or have achieved a basic level of Popia compliance. They have identified protecting customers’ data as their top security priority, which will involve investing in the tools and solutions needed to help identify, classify, protect and govern their data while ensuring full compliance with regulations.

    IDC research showed that 25% of businesses failed to meet privacy regulations such as Popia or GDPR in the past 12 months

    These solutions – like most security measures in a rapidly changing landscape – are increasingly automated and intelligent to allow businesses to map and monitor their obligations, roles and responsibilities, and regulatory adherence end-to-end.

    Taking a more automated, intelligent approach to data classification, management and governance also helps prevent data loss by preventing accidental oversharing of sensitive or confidential information – which will only become more critical as the amount of data continues to mushroom, as do the risks associated with breaches of this data.

    In modern workplaces where technology, security and compliance needs are diverse and ever-changing, and the threat landscape evolves accordingly, businesses need to ensure that their entire digital world has a solid foundation of integrated, comprehensive security. And data protection and governance are the keystone to that foundation.

    About Microsoft
    Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organisation on the planet to achieve more. Find Microsoft South Africa on Twitter or Facebook.

    • The author, Colin Erasmus, is Modern Workplace and Security Business Group lead at Microsoft South Africa
    • This promoted content was paid for by the party concerned


    colin erasmus Facebook Twitter
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBusiness must respond to increasingly mobile consumer behaviour in SA
    Next Article South African miners back shift from coal-fired power

    Related Posts

    X moves to block bid to revive Twitter brand

    X moves to block bid to revive Twitter brand

    17 December 2025
    Australia has banned kids from social media. Should South Africa follow suit?

    Australia has banned kids from social media. Should South Africa follow suit?

    11 December 2025
    Australia fires starting gun on global social media reform

    Australia fires starting gun on global social media reform

    10 December 2025
    Add A Comment

    Comments are closed.

    Company News
    Breaking silos with SAS: Agile insurance in an uncertain world

    Breaking silos with SAS: agile insurance in an uncertain world

    2 February 2026
    Stellar year expected for Digicloud Africa and its reseller partners - Gregory MacLennan

    Stellar year expected for Digicloud Africa and its reseller partners

    2 February 2026
    How to subscribe to South Africa's best tech podcasts - TechCentral

    How to subscribe to South Africa’s best tech podcasts

    2 February 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    SpaceX acquires xAI in record-breaking deal

    SpaceX acquires xAI in record-breaking deal

    3 February 2026
    Haier plants its flag in South Africa

    Haier plants its flag in South Africa

    2 February 2026
    Microsoft's winning formula is starting to fray - Satya Nadella

    Microsoft’s winning formula may be starting to fray

    2 February 2026
    Meet the CIO | Inside the JSE's tech engine with CIO Tebalo Tsoaeli

    Meet the CIO | Inside the JSE’s tech engine with CIO Tebalo Tsoaeli

    2 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}