Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Vodacom, Maziv deal now looks likely after CompCom U-turn

      8 July 2025

      Icasa publishes new draft regulations for digital TV

      8 July 2025

      Fast-growing Beira port to get private mobile network

      8 July 2025

      MultiChoice hit with multimillion-rand fine for privacy ‘breaches’

      8 July 2025

      Still in play: Ramaphosa banks on talks to ease US tariff blow

      8 July 2025
    • World

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025

      Jony Ive’s first AI gadget could be … a pen

      30 June 2025

      Bumper orders for Xiaomi’s YU7 SUV heighten threat to Tesla

      27 June 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025

      TCS+ | First Distribution on data governance in hybrid cloud environments

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » The state of cybersecurity across African businesses

    The state of cybersecurity across African businesses

    By First Distribution powered by AVeS Cyber Security5 August 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The old adage is true: the numbers don’t lie. We wanted to know what the numbers say about how well organisations today are progressing toward a more secure future. Your data is your IP. While this gives you a strong competitive edge, it’s also an asset associated with high risk should your environment be compromised in some way. So, what is the state of cloud security in your business today?

    If you assessed your gaps, you could be pleasantly surprised. Unfortunately, and in our experience, you may also be faced with some critical gaps that need to be filled. As businesses invest in new cloud environments, the associated complexity can lead to significant security lapses. CloudSecure is the answer. We’re able to identify many security gaps in your business, including those in your cloud architecture, and what can be done to bridge them.

    Multi-cloud strategies: the good, the bad and the ugly

    A common theme that runs through business-related insights and advice in today’s highly competitive landscape is whether your business is future proof. It’s a broad term, covering everything from embracing a disruptive mindset to paying attention to the latest trends impacting your sector or industry.

    We believe that future-proofing any business begins and ends with technology and data.

    Data is the new gold

    Data today is more valuable than any other resource. How we do business, who we interact with, the products and solutions we develop — all of these business imperatives are based on data. And the world knows it.

    The Digital 2019: Global Digital Overview reports that Internet users are now growing by an average of more than a million new users every day.

    This in turn means that the growth of data being generated and stored is exponential.

    This presents an incredible opportunity for businesses that understand the data they are collecting. With the right data at your fingertips, you can provide personalised solutions for your customers that give you a massive advantage over your competitors.

    But with opportunity comes risk.

    Cybercrime and the rise of data

    Unfortunately, while the rise of data gives businesses an unprecedented edge, cybersecurity threats are on the rise as criminals seek to access that same data.

    As we’ve noted, global data is growing exponentially. Unfortunately, cybercrime continues to be on the rise as well.

    The Global Cyber Exposure Index ranks South Africa sixth on the list of most-targeted countries for cyber-attacks.

    According to the Microsoft Security Intelligence Report, Volume 24, 6.5 trillion threat signals go through the Microsoft Cloud every day.

    Microsoft analyses and scans more than 470 billion e-mail messages in Office 365 every month for phishing and malware, which provides analysts with considerable insight into attacker trends and techniques.

    The share of inbound e-mails that were phishing messages increased by 250% between January and December 2018.

    Phishing remains one of the top attack vectors used to deliver malicious zero-day payloads to users, and Microsoft has continued to harden its technologies against these attacks with additional anti-phishing protection, detection, investigation and response capabilities to help secure users.

    Accessing and protecting data

    Compounding the fact that cybersecurity issues are becoming a day-to-day struggle for businesses is the fact that connected devices surround us. Trends reveal that there has been a significant increase in hacked and breached data from mobile and connected IoT devices — all common in today’s workplace.

    Consider how many smartphones, tablets and laptops enter and exit your offices every day. Now consider how much data is stored on these devices, and how much data they have access to when they connect to your server, whether that’s on-premise or through the cloud.

    In our experience, most companies are in the business of collecting data and utilising it to offer a better solution to customers. They’re not data security specialists — nor do they need to be. It’s a complex and ever-changing field.

    The challenge is that this results in most businesses having unprotected data and poor cybersecurity practices in place — without even realising it.

    Discovering where you’re at risk – and protecting against it

    From identity and access management to HR, every part of your business relies on data, which means every part of your business is potentially at risk.

    Have you considered what could happen if a cyber-breach reaches your client information? What about employee data? What impact would this have on your business?

    To protect personal and sensitive information, we’ve partnered with AVeS Cyber Security, specialists in this field. We’ve found that the first step to protecting a business’s data is understanding where the critical gaps lie.

    This assessment includes a review of your business’s information security in terms of your IT governance and management framework. It includes associated policies, procedures, guidelines and checklists, as well as the technical implementation of cyber-defence plan in your business.

    It also includes what comprehensive and holistic information security governance should look like in your business.

    To understand the critical gaps in your security, First Distribution is offering a discounted one-day and five-day CloudSecure Security Assessment, powered By AVeS Cyber Security.

    Book your CloudDecure Security Assessment now or contact [email protected] for more information.

    • This promoted content was paid for by the party concerned


    AVeS Cyber Security CloudSecure First Distribution
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWatch | Accenture’s Kabelo Makwane on business disruption in Africa
    Next Article Bitcoin may now be ‘digital gold’ as investors seek safe haven

    Related Posts

    TCS+ | First Distribution on the latest and greatest cloud technologies

    27 June 2025

    TCS+ | First Distribution on data governance in hybrid cloud environments

    27 June 2025

    TCS+ | First Distribution on cloud cost management in Microsoft Azure

    26 June 2025
    Company News

    Huawei South Africa Partners Forum 2025: joining hands for a digital, intelligent future

    8 July 2025

    Powering South Africa’s industrial intelligence with Huawei Cloud’s AI-native innovations

    8 July 2025

    Rain launches a new way to connect. It’s a loop

    8 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.