Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Liquid dodges debt crunch - at a hefty price - Hardy Pemhiwa

      Liquid dodges debt crunch – at a hefty price

      21 April 2026
      Microsoft slashes Xbox Game Pass prices in big strategy shift

      Microsoft slashes Xbox Game Pass prices in big strategy shift

      21 April 2026
      Naspers stalwart Steve Pacak passes away

      Naspers stalwart Steve Pacak passes away

      21 April 2026
      Why AI chatbots are a legal liability waiting to happen - Ahmore Burger-Smidt

      Why AI chatbots are a legal liability waiting to happen

      21 April 2026
      South African tech juniors squeezed as AI reshapes hiring

      South African tech juniors squeezed as AI reshapes hiring

      21 April 2026
    • World
      More organic compounds detected on Mars - Nasa Curiosity rover

      More organic compounds detected on Mars

      21 April 2026
      Adobe bets on AI agents to fend off cheaper rivals

      Adobe bets on AI agents to fend off cheaper rivals

      16 April 2026
      Google poised to lose ad crown to Meta

      Google poised to lose ad crown to Meta

      14 April 2026
      Grand Theft Data - hackers hit Rockstar Games - Grand Theft Auto

      Grand Theft Data – hackers hit Rockstar Games

      14 April 2026
      UK PM Keir Starmer declares war on doomscrolling

      UK PM Keir Starmer declares war on doomscrolling

      13 April 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » The state of cybersecurity across African businesses

    The state of cybersecurity across African businesses

    By First Distribution powered by AVeS Cyber Security5 August 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The old adage is true: the numbers don’t lie. We wanted to know what the numbers say about how well organisations today are progressing toward a more secure future. Your data is your IP. While this gives you a strong competitive edge, it’s also an asset associated with high risk should your environment be compromised in some way. So, what is the state of cloud security in your business today?

    If you assessed your gaps, you could be pleasantly surprised. Unfortunately, and in our experience, you may also be faced with some critical gaps that need to be filled. As businesses invest in new cloud environments, the associated complexity can lead to significant security lapses. CloudSecure is the answer. We’re able to identify many security gaps in your business, including those in your cloud architecture, and what can be done to bridge them.

    Multi-cloud strategies: the good, the bad and the ugly

    A common theme that runs through business-related insights and advice in today’s highly competitive landscape is whether your business is future proof. It’s a broad term, covering everything from embracing a disruptive mindset to paying attention to the latest trends impacting your sector or industry.

    We believe that future-proofing any business begins and ends with technology and data.

    Data is the new gold

    Data today is more valuable than any other resource. How we do business, who we interact with, the products and solutions we develop — all of these business imperatives are based on data. And the world knows it.

    The Digital 2019: Global Digital Overview reports that Internet users are now growing by an average of more than a million new users every day.

    This in turn means that the growth of data being generated and stored is exponential.

    This presents an incredible opportunity for businesses that understand the data they are collecting. With the right data at your fingertips, you can provide personalised solutions for your customers that give you a massive advantage over your competitors.

    But with opportunity comes risk.

    Cybercrime and the rise of data

    Unfortunately, while the rise of data gives businesses an unprecedented edge, cybersecurity threats are on the rise as criminals seek to access that same data.

    As we’ve noted, global data is growing exponentially. Unfortunately, cybercrime continues to be on the rise as well.

    The Global Cyber Exposure Index ranks South Africa sixth on the list of most-targeted countries for cyber-attacks.

    According to the Microsoft Security Intelligence Report, Volume 24, 6.5 trillion threat signals go through the Microsoft Cloud every day.

    Microsoft analyses and scans more than 470 billion e-mail messages in Office 365 every month for phishing and malware, which provides analysts with considerable insight into attacker trends and techniques.

    The share of inbound e-mails that were phishing messages increased by 250% between January and December 2018.

    Phishing remains one of the top attack vectors used to deliver malicious zero-day payloads to users, and Microsoft has continued to harden its technologies against these attacks with additional anti-phishing protection, detection, investigation and response capabilities to help secure users.

    Accessing and protecting data

    Compounding the fact that cybersecurity issues are becoming a day-to-day struggle for businesses is the fact that connected devices surround us. Trends reveal that there has been a significant increase in hacked and breached data from mobile and connected IoT devices — all common in today’s workplace.

    Consider how many smartphones, tablets and laptops enter and exit your offices every day. Now consider how much data is stored on these devices, and how much data they have access to when they connect to your server, whether that’s on-premise or through the cloud.

    In our experience, most companies are in the business of collecting data and utilising it to offer a better solution to customers. They’re not data security specialists — nor do they need to be. It’s a complex and ever-changing field.

    The challenge is that this results in most businesses having unprotected data and poor cybersecurity practices in place — without even realising it.

    Discovering where you’re at risk – and protecting against it

    From identity and access management to HR, every part of your business relies on data, which means every part of your business is potentially at risk.

    Have you considered what could happen if a cyber-breach reaches your client information? What about employee data? What impact would this have on your business?

    To protect personal and sensitive information, we’ve partnered with AVeS Cyber Security, specialists in this field. We’ve found that the first step to protecting a business’s data is understanding where the critical gaps lie.

    This assessment includes a review of your business’s information security in terms of your IT governance and management framework. It includes associated policies, procedures, guidelines and checklists, as well as the technical implementation of cyber-defence plan in your business.

    It also includes what comprehensive and holistic information security governance should look like in your business.

    To understand the critical gaps in your security, First Distribution is offering a discounted one-day and five-day CloudSecure Security Assessment, powered By AVeS Cyber Security.

    Book your CloudDecure Security Assessment now or contact [email protected] for more information.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    AVeS Cyber Security CloudSecure First Distribution
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWatch | Accenture’s Kabelo Makwane on business disruption in Africa
    Next Article Bitcoin may now be ‘digital gold’ as investors seek safe haven

    Related Posts

    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | Lessons from South Africa’s biggest cyberattacks

    25 July 2025
    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | First Distribution’s guide to a bulletproof cyber crisis response strategy

    24 July 2025
    TCS+ | Lessons from South Africa's biggest cyberattacks - Kejen Pillay First Distribution Microsoft

    TCS+ | How cyberthreats turn into cyber crises

    23 July 2025
    Company News
    Why retail's future is digital - but still physical - NEC XON

    Why the future of retail is digital – but still physical

    21 April 2026
    Africa's AI dream needs bricks and gigawatts - Gary Galolo, head of technology, media, and telecommunications and digital infrastructure finance at Nedbank CIB

    Africa’s AI dream needs bricks and gigawatts

    21 April 2026
    Fibre: the backbone of South Africa's digital health ecosystem - Mweb

    Fibre: the backbone of South Africa’s digital health ecosystem

    16 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Liquid dodges debt crunch - at a hefty price - Hardy Pemhiwa

    Liquid dodges debt crunch – at a hefty price

    21 April 2026
    Microsoft slashes Xbox Game Pass prices in big strategy shift

    Microsoft slashes Xbox Game Pass prices in big strategy shift

    21 April 2026
    Naspers stalwart Steve Pacak passes away

    Naspers stalwart Steve Pacak passes away

    21 April 2026
    Why AI chatbots are a legal liability waiting to happen - Ahmore Burger-Smidt

    Why AI chatbots are a legal liability waiting to happen

    21 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}