Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      MVNO boom is reshaping South Africa’s mobile market

      12 June 2025

      South African law is failing gig-economy workers

      12 June 2025

      MultiChoice’s TV empire shrinks – but its ‘side hustles’ are holding strong

      12 June 2025

      MultiChoice is bleeding subscribers

      11 June 2025
    • World

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025

      Mark Zuckerberg has finally found a use for his metaverse

      30 May 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Unmasking cyberthreats in Africa

    Unmasking cyberthreats in Africa

    Promoted | Check Point’s Lionel Dartnall unpacks the challenges and solutions in the cybersecurity landscape.
    By Check Point Software Technologies26 August 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Unmasking cyberthreats in Africa - the author, Check Point's Lionel Dartnall
    The author, Check Point’s Lionel Dartnall

    Africa has become a prime target for cybercriminals. Check Point recently reported that in the second quarter of 2024, Africa saw the highest average number of cyberattacks per organisation, with an average of 2 960 attacks per week. This represents a 37% increase compared to the same period in 2023. In contrast, the global average stood at 1 636 attacks per organisation per week, reflecting a 30% increase from the previous year.

    The research also showed that Kenya, Nigeria and South Africa are among the top African countries facing significant cyberthreats, with South Africa experiencing an average of 1 450 weekly attacks per organisation, marking a 4% year on year increase.

    The continent is lagging in terms of visibility in cybersecurity. Many organisations struggle to know where their assets are, who has access to them and how they are secured. Governments and healthcare sectors are particularly vulnerable due to fragmented IT infrastructures and the adoption of multiple cloud services without adequate security controls in place.

    A proactive approach to cybersecurity is essential to protect valuable assets and maintain economic stability

    Cybercriminals exploit these weaknesses, seeking valuable data such as personal identifiable information and exploiting them through ransomware attacks. The impact of these attacks is profound, affecting GDP and economic stability. The cost of cybercrime to the South African economy is estimated at R2.2 billion annually, according to the CSIR.

    This financial burden represents a significant portion of the country’s GDP, highlighting the severe economic impact. Despite this, only 0.1% of the national budget is allocated to cybersecurity prevention efforts. The loss of US$9.8-trillion globally to cybercrime underscores the need for robust cybersecurity measures. Cybersecurity must be built into every business process, especially when dealing with customer data.

    Increase in attacks

    Statistics from Check Point’s recent research reveal a significant increase in attacks on the African market, with a notable rise in sophisticated threat actor initiatives bypassing modern security controls. An alarming example is the resurgence of Internet Explorer exploits, highlighting the need for constant vigilance in identifying and addressing overlooked software vulnerabilities.

    To combat these threats, organisations must prioritise cybersecurity in their budgets and ensure compliance with regulations like the Protection of Personal Information Act (Popia) and the General Data Protection Regulation (GDPR). Regular cybersecurity assessments, including free posture checkups offered by cybersecurity firms, can help identify vulnerabilities and improve security postures.

    Key cybersecurity focus areas for African businesses

    1. Visibility: Improve asset tracking and control, especially in cloud environments
    2. Preparedness: Adopt comprehensive cybersecurity frameworks and regular assessments
    3. Regulations: Ensure compliance with local and international data protection laws to mitigate risks

    Africa’s cybersecurity challenges are significant but not insurmountable. By prioritising visibility, preparedness and compliance, organisations can strengthen their defences against relentless cyberthreats. A proactive approach to cybersecurity is essential to protect valuable assets and maintain economic stability.

    About Check Point Software Technologies
    Check Point Software Technologies is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services. Follow Check Point on LinkedIn, X, YouTube or Facebook, or read the company’s blog.

    • The author, Lionel Dartnall, is sales engineering manager for the SADC region at Check Point Software Technologies
    • Read more articles by Check Point Software Technologies on TechCentral
    • This promoted content was paid for by the party concerned


    Check Point Check Point Software Technologies
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBookmarks | Apple is forking the iPhone
    Next Article Qlik Joburg AI Reality Tour: business success to take centre stage

    Related Posts

    MTN attackers made demand for payment

    29 April 2025

    Africa has become a top target of cyberattackers

    25 November 2024

    Advanced techniques and future threats – navigating cybersecurity in Africa

    9 September 2024
    Add A Comment

    Comments are closed.

    Company News

    Building a cyber-resilient culture from the boardroom to the front lines

    12 June 2025

    How South Africa’s municipalities are finally getting smart

    12 June 2025

    Ransomware roulette: pay up or power through?

    11 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.