Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      China’s car factories run cold as price war masks deep overcapacity

      19 June 2025

      Yellow Card, Visa in deal to hasten stablecoin uptake in Africa

      19 June 2025

      Jaltech backs solar firm Wetility in R500-million capital raise

      18 June 2025

      MTN CEO edges Vodacom rival in pay stakes – but just barely

      18 June 2025

      Stolen phone? Samsung now buys you an hour to lock it down

      18 June 2025
    • World

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025

      Yahoo tries to make its mail service relevant again

      13 June 2025
    • In-depth

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025
    • TCS

      TCS+ | AfriGIS’s Helen Hulett on how tech can help resolve South Africa’s water crisis

      18 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025
    • Opinion

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Cyber resilience is critical to your business – what you need to know

    Cyber resilience is critical to your business – what you need to know

    Promoted | Cyber resilience is an organisation’s ability anticipate, withstand, recovering from and adapting to adverse cyber conditions.
    By Qush2 September 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Cyber resilience is an organisation’s ability to stand up to adverse cyber events: anticipating, withstanding, recovering from and adapting to adverse cyber conditions such as cyberattacks and security system compromises.

    When a company is affected by a cyberattack, possibly caused by a security vulnerability, cyber resilience includes the ability of the organisation to get back on its feet.

    While cybersecurity primarily deals with how an organisation can prevent a cyberattack, cyber resilience relates to the ability to recover from a cyberattack – mitigating cyber damage and ensuring business continuity, even if systems have been compromised. Adverse security events can result from adversarial threats like data breaches (insider threat, malware, system intrusion, denial of service, social engineering, etc) or non-adversarial threats like human error.

    How can cybersecurity awareness and education help cyber resilience?

    Non-adversarial threats can cripple an organisation and result in damages to the security infrastructure. By delivering an understanding of cyber risk and cybersecurity incident scenarios, cybersecurity awareness training discourages negligent or risky user behaviours.

    While working outside of the office, users are exposed to a plethora of external cyber threats and potential data breach scenarios. Implementing proactive prevention through zero-trust security is essential, but sometimes it is not enough. You need your IT users and employees to be on your side. Security awareness training is often listed as the number one precaution aimed at improving cyber resilience. And it is an integral part of many cyber resilience frameworks.

    No security solution or cybersecurity technology is perfect. In 2020, an estimated 81% of organisations were affected by a successful cybersecurity attack. Sometimes it is best to assume there will be an attack and build comprehensive post-incident scenarios. Cybersecurity education is essential in enabling investigators to assess a security breach and to implement a data breach protocol quickly.

    The more your employees are receptive to cybersecurity and understands its importance, the stronger your cybersecurity posture and the larger your degree of cyber resilience. Once again, creating a positive cybersecurity culture is functional to recovering quickly from an attack.

    What is cybersecurity maturity?

    Cybersecurity maturity refers to an organisation’s degree of readiness to prevent threats from hackers, manage vulnerabilities and respond to attacks. This includes assessing cybersecurity posture, comprehending the degree of preparedness, and defining procedures and protocols aimed at preventing cyber threats before they become breaches.

    Organisations can improve their degree of cybersecurity maturity by addressing issues proactively to reduce their attack surface. Cyber maturity frameworks like the NIST Cybersecurity Framework or the Cybersecurity Capability Maturity Model (C2M2) provide guidance to evaluate an organisation’s cybersecurity programme and its underlying people, processes and technologies. They are often based on existing standards, guidelines and practices (for instance, threat detection and response or data protection standards) and aim to guide organisations to better manage and reduce cybersecurity risk.

    Cybersecurity frameworks are divided into components or domains and often are paired with scoring systems that allow organisations to assess their level of readiness on several levels. This structured performance appraisal known as cyber maturity assessment allows evaluating an organisation’s cybersecurity functions such as the ability to identify cybersecurity risks, prevent them, respond to cyber risks and recover from cybersecurity incidents.

    User education and cyber maturity

    Cybersecurity practices that guarantee a strong cybersecurity posture have seen huge advancements in recent years. For instance, penetration testing, system hardening, secure software development and digital forensics have massively evolved. But what about cybersecurity awareness? SANS feels that “one of the biggest challenges we face in security awareness is its lack of maturity” and for this reason, they defined a Security Awareness Maturity Model.

    Cyber mature organisations exceed simple requirements dictated by basic cybersecurity compliance. Just delivering one presentation a year won’t cut it. At the very least, employees need to gain confidence in organisational policies, understand their role in protecting information assets, and absorb how to prevent, identify or report a security incident. And for the organisation to maintain a reasonable level of security awareness maturity, a cybersecurity awareness programme that makes an impact needs to hinge on selecting the topics that have the greatest potential of cyber-threat prevention, implementing continuous reinforcement of cybersecurity education, encouraging positive behaviour change and communicating topics positively and engagingly.

    Our answer to all these questions is simple: active cyber learning and incident-based training. By adopting these strategies, companies and organisations can readily improve their level of cybersecurity maturity.

    Qush Security in South Africa

    Organisations need a data security solution that works consistently, a data security solution that is easy to implement and is equally easy to manage.

    This is what Qush has delivered in its Reveal platform.

    Qush recently expanded its presence into the South African market and has already partnered with organisations that are seeing the benefit of a human-centric approach to data security.

    Reach out to Qush Security for a pragmatic and straightforward conversation about how we can help you significantly improve your data security posture. You can find out more about us or contact us via www.Qush.com or www.solid8.co.za.

    • This promoted content was paid for by the party concerned


    Qush Qush Security
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWerner Kapp named as new CEO of Altron
    Next Article Is your data neglected or protected? It’s time you knew

    Related Posts

    Constance Stack named as new CEO of Next DLP

    9 November 2022

    Solid8 Technologies’ global vendors bring cybersecurity to South Africa

    12 September 2022

    Qush on infosec: why prevention is always better than cure

    11 August 2022
    Add A Comment

    Comments are closed.

    Company News

    Disrupt first, ask questions later – the uncomfortable truth about incident response

    18 June 2025

    Sage brings together HR leaders to explore the future of payroll and people management

    18 June 2025

    Altron: a brand journey, a birthday celebration and a bet on Joburg’s future

    17 June 2025
    Opinion

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    AI and the future of ICT distribution

    16 June 2025

    Singapore soared – why can’t we? Lessons South Africa refuses to learn

    13 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.