Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      World Bank set to back South Africa’s big energy grid roll-out

      20 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Sita hits back at critics, promises faster, automated procurement

      20 June 2025

      The transatlantic race to create the first television

      20 June 2025

      Listed: All the MVNOs in South Africa – 2025 edition

      19 June 2025
    • World

      Watch | Starship rocket explodes in setback to Musk’s Mars mission

      19 June 2025

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025
    • In-depth

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025
    • TCS

      TCS+ | AfriGIS’s Helen Hulett on how tech can help resolve South Africa’s water crisis

      18 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025
    • Opinion

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » This is how you overcome the biggest cybersecurity threat to you today

    This is how you overcome the biggest cybersecurity threat to you today

    By Guy Golan22 June 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Many organisations approach cybersecurity the wrong way. It’s expensive and it leaves them vulnerable and exposed.

    But who can blame them? A lot has changed, very quickly, in the way they must make their operational data and business systems accessible. Hackers are smarter than ever, with more funding than ever, and they’re more incentivised considering the potential payoffs so the security threats now are far greater. Vendors, consultants and service providers rightly point to this trend as evidence that organisations must secure themselves against a multitude of threats. But the problem is that it makes cybersecurity complex, expensive and difficult, besides also making it less effective than it should be.

    To learn more, please visit Performanta’s website

    I call these the three axes of confusion. There is, however, a much smarter, more cost-effective way to improve cybersecurity for both current and future threats but achieving it means we must transcend the three axes.

    The real value for customers is not in putting licence fees behind a point solution for a risk that may never materialise

    The first axis is the increasing sophistication of attacks attempting to infiltrate organisations from a wider range of vectors. These are the attacks on Internet of things devices, permissions systems, shared resources like cloud drives, exploiting misconfigured systems, poorly managed employee offboarding, lack of visibility into cloud systems, and so on.

    The second axis is the evolution of how employees interact with business systems. The rapid, widespread shift to working from home and, more recently, hybrid working environments demands extensive changes to permissions and accessibility, processes, workflows, connectivity and more. All impact the security posture that a lot of organisations are rightly finding complex and difficult to dependably mature.

    Full picture?

    The third axis places vendors and their technologies at its centre. Most vendors specialise in one or a few elements of cybersecurity and their marketing machines are geared to focus on their own benefits while disregarding others. That’s not to say they’re wrong, but they’re not necessarily painting the full picture, which can confuse customers.

    A lot of the time we see the cybersecurity discussion broken down into a commercial proposition. But the real value for customers is not in putting licence fees behind a point solution for a risk that may never materialise. Rather, value is created by understanding the specific threats to a particular organisation, then leveraging existing investments and supplementing them where necessary, in order to mitigate the risks and contain the exposure. In other words, secure what is both valuable and vulnerable.

    To do so requires holistic cybersecurity capabilities that makes organisations aware of what’s at risk and from whom, secures their assets, keeps their reputations safe, and is responsive if and when an emergency arises.

    The data that runs through the business systems employees use daily, for example, is very often both valuable and at risk. For many organisations today, that means protecting Microsoft and related environments. Office 365 (now Microsoft 365) is a staple of digital transformation. Establishing and maintaining it in a secure state limits organisational exposure to risk.

    That’s one of the primary reasons we acquired Identity Experts in April. They have unrivalled resources to skilfully handle identity and access management (IAM), which complements our broader, global cybersecurity capability. They have particular strengths in Microsoft technologies, as well as others. Their strong UK presence also complements our traditional South African base and growing US operation, ensuring both ongoing access to top certified Microsoft and other skills worldwide with the capability to serve our clients regionally.

    Value is created by understanding the specific threats to a particular organisation, then leveraging existing investments and supplementing them where necessary

    Most medium-sized organisations need a cybersecurity partner for strategic advice and services that will facilitate their transition from a predominantly Microsoft productivity and collaboration engagement upfront into other, more specific areas of their business. Larger enterprises with extensive onboard cybersecurity resources rely on specialist consultation from time to time to cater for niche elements of their operations.

    Transforming cybersecurity approaches from commercial orientations to business value engagements is the most effective method to swiftly and comprehensively secure modern businesses. It’s also the most effective reference point for overcoming the three major challenges organisations face today: the hacker menace, hybrid work environments and the complexity of cybersecurity technologies.

    Reach out to my team and I at [email protected], so we can help you develop a strategic cybersecurity road map that protects your business now and in the future.

    • Guy Golan is co-founder and CEO of Performanta
    • This promoted content was paid for by the party concerned


    Guy Golan Performanta
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleTakealot’s sales boomed last year, despite Patel’s ban
    Next Article Interview: The modern threat landscape – identify, isolate, respond

    Related Posts

    Watch | Webinar: Dealing with your most pressing cybersecurity threats

    7 August 2020

    Webinar: Cybersecurity – where should your focus be?

    31 July 2020
    Company News

    Making IT happen: how Trade Link gears up to enable SA retail strategies

    20 June 2025

    Why parents choose CambriLearn for online education

    19 June 2025

    Disrupt first, ask questions later – the uncomfortable truth about incident response

    18 June 2025
    Opinion

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    AI and the future of ICT distribution

    16 June 2025

    Singapore soared – why can’t we? Lessons South Africa refuses to learn

    13 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.