Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      1 April 2026
      R12.1-billion wasted as government IT projects collapse - Sita

      R12.1-billion wasted as government IT projects collapse

      1 April 2026
      DStv 4K streaming launch is not imminent

      R99 DStv deal to keep Showmax subscribers from bolting

      1 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
    • World

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » The state of cybersecurity across African businesses

    The state of cybersecurity across African businesses

    By First Distribution powered by AVeS Cyber Security5 August 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The old adage is true: the numbers don’t lie. We wanted to know what the numbers say about how well organisations today are progressing toward a more secure future. Your data is your IP. While this gives you a strong competitive edge, it’s also an asset associated with high risk should your environment be compromised in some way. So, what is the state of cloud security in your business today?

    If you assessed your gaps, you could be pleasantly surprised. Unfortunately, and in our experience, you may also be faced with some critical gaps that need to be filled. As businesses invest in new cloud environments, the associated complexity can lead to significant security lapses. CloudSecure is the answer. We’re able to identify many security gaps in your business, including those in your cloud architecture, and what can be done to bridge them.

    Multi-cloud strategies: the good, the bad and the ugly

    A common theme that runs through business-related insights and advice in today’s highly competitive landscape is whether your business is future proof. It’s a broad term, covering everything from embracing a disruptive mindset to paying attention to the latest trends impacting your sector or industry.

    We believe that future-proofing any business begins and ends with technology and data.

    Data is the new gold

    Data today is more valuable than any other resource. How we do business, who we interact with, the products and solutions we develop — all of these business imperatives are based on data. And the world knows it.

    The Digital 2019: Global Digital Overview reports that Internet users are now growing by an average of more than a million new users every day.

    This in turn means that the growth of data being generated and stored is exponential.

    This presents an incredible opportunity for businesses that understand the data they are collecting. With the right data at your fingertips, you can provide personalised solutions for your customers that give you a massive advantage over your competitors.

    But with opportunity comes risk.

    Cybercrime and the rise of data

    Unfortunately, while the rise of data gives businesses an unprecedented edge, cybersecurity threats are on the rise as criminals seek to access that same data.

    As we’ve noted, global data is growing exponentially. Unfortunately, cybercrime continues to be on the rise as well.

    The Global Cyber Exposure Index ranks South Africa sixth on the list of most-targeted countries for cyber-attacks.

    According to the Microsoft Security Intelligence Report, Volume 24, 6.5 trillion threat signals go through the Microsoft Cloud every day.

    Microsoft analyses and scans more than 470 billion e-mail messages in Office 365 every month for phishing and malware, which provides analysts with considerable insight into attacker trends and techniques.

    The share of inbound e-mails that were phishing messages increased by 250% between January and December 2018.

    Phishing remains one of the top attack vectors used to deliver malicious zero-day payloads to users, and Microsoft has continued to harden its technologies against these attacks with additional anti-phishing protection, detection, investigation and response capabilities to help secure users.

    Accessing and protecting data

    Compounding the fact that cybersecurity issues are becoming a day-to-day struggle for businesses is the fact that connected devices surround us. Trends reveal that there has been a significant increase in hacked and breached data from mobile and connected IoT devices — all common in today’s workplace.

    Consider how many smartphones, tablets and laptops enter and exit your offices every day. Now consider how much data is stored on these devices, and how much data they have access to when they connect to your server, whether that’s on-premise or through the cloud.

    In our experience, most companies are in the business of collecting data and utilising it to offer a better solution to customers. They’re not data security specialists — nor do they need to be. It’s a complex and ever-changing field.

    The challenge is that this results in most businesses having unprotected data and poor cybersecurity practices in place — without even realising it.

    Discovering where you’re at risk – and protecting against it

    From identity and access management to HR, every part of your business relies on data, which means every part of your business is potentially at risk.

    Have you considered what could happen if a cyber-breach reaches your client information? What about employee data? What impact would this have on your business?

    To protect personal and sensitive information, we’ve partnered with AVeS Cyber Security, specialists in this field. We’ve found that the first step to protecting a business’s data is understanding where the critical gaps lie.

    This assessment includes a review of your business’s information security in terms of your IT governance and management framework. It includes associated policies, procedures, guidelines and checklists, as well as the technical implementation of cyber-defence plan in your business.

    It also includes what comprehensive and holistic information security governance should look like in your business.

    To understand the critical gaps in your security, First Distribution is offering a discounted one-day and five-day CloudSecure Security Assessment, powered By AVeS Cyber Security.

    Book your CloudDecure Security Assessment now or contact [email protected] for more information.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    AVeS Cyber Security CloudSecure First Distribution
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWatch | Accenture’s Kabelo Makwane on business disruption in Africa
    Next Article Bitcoin may now be ‘digital gold’ as investors seek safe haven

    Related Posts

    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | Lessons from South Africa’s biggest cyberattacks

    25 July 2025
    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | First Distribution’s guide to a bulletproof cyber crisis response strategy

    24 July 2025
    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | How cyberthreats turn into cyber crises

    23 July 2025
    Company News
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Paratus launches Starlink-powered connectivity for Africa's essential services - Paratus Essential Access

    Paratus launches Starlink-powered connectivity for Africa’s essential services

    1 April 2026
    How consumers can identify a true QLED TV

    How consumers can identify a true QLED TV

    30 March 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    1 April 2026
    R12.1-billion wasted as government IT projects collapse - Sita

    R12.1-billion wasted as government IT projects collapse

    1 April 2026
    DStv 4K streaming launch is not imminent

    R99 DStv deal to keep Showmax subscribers from bolting

    1 April 2026
    TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

    TCS | MTN’s Divyesh Joshi on the strategy behind Pi

    1 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}