Back
Cyber
Short-term
February 5, 2019

South Africa a high target for Cyber Attacks

<strong>By: King Price & Mimecast</strong>

The digitisation of our personal and work lives is making society increasingly reliant on technology, and more vulnerable to the risk of a debilitating cyber attack. With the accelerating pace of technological change, attacks are continuously intensifying in frequency and severity. Data breaches, the theft of business critical information and ransom demands are all threatening the reputation and stability of businesses.

The World Economic Forum recently listed cybersecurity as the fifth highest global risk for doing business, and IT is considered the top risk in Europe, North America and East Asia. South Africa is becoming a major target for cyber attacks. According to the South African Banking Risk Information Centre (SABRIC), the country has the third highest number of cybercrime victims worldwide - losing around R2.2 billion a year to cyberattacks.

New sophisticated methods of attack include targeting essential infrastructure, co-operation between attackers, the use of artificial intelligence and remote access takeovers through Internet of Things (IOT) devices. Small businesses are particularly at risk, with cyber defenses that are easier to breach.

<strong>Creating threat awareness and cyber resilience</strong>

With today being World Safer Internet Day, <a href="https://www.mimecast.com/" data-saferedirecturl="https://www.google.com/url?q=https://www.mimecast.com/&amp;source=gmail&amp;ust=1549097558609000&amp;usg=AFQjCNFPjlNpyLGvcYu144u2GZ6pPLnsiQ">Mimecast’s</a> Heino Gevers (Security Specialist), suggests businesses protect themselves against a potentially devastating cyberattack, by implementing a robust cyber resilience strategy. Nine of out ten data breaches start with email, so it’s important to not only prevent email-borne cyberattacks but to be able to recover from them as well. This can be achieved by having the right advanced security services in place before an attack happens, continuity during an attack and the ability to recover data after an attack. Additionally, organisations should improve their defenses by reducing human error with an effective user awareness training programme.

Another essential defense mechanism is making use of threat intelligence. Security leaders should use data from multiple internal and external sources and use it to identify emerging threats, unearth the conditions needed to exploit vulnerabilities, and discover whether the threat is being actively used. While this has previously been the reserve of large, well-funded organisations, threat intelligence is increasingly becoming accessible and affordable to most businesses.

<strong>A cyber security strategy</strong>

After an attack, it can be difficult, if not impossible, for a business to recover without the correct solutions in place. According to <a href="https://www.kingprice.co.za/" data-saferedirecturl="https://www.google.com/url?q=https://www.kingprice.co.za/&amp;source=gmail&amp;ust=1549097558609000&amp;usg=AFQjCNFmx4gP6bga8-5gtjpeL0XJwcOTYg">King Price’s</a> Wynand van Vuuren (Partner of Client Experience) combining a proactive security approach with a strong cyber insurance policy is essential for any business to guard against the potential cost of restoring productivity and reputation.

Proactive security measures include implementing firewalls, appropriate security software, malware scanning and continuous employee training on the basics of security.

While a cyber insurance policy can’t prevent your company from being attacked, it is an important way to protect businesses from the after-effects of a breach.

<strong>King Price’s cybersure policy covers:</strong>

<ul>

<li>Data breach expenses, including cover for the costs of hiring legal and forensic IT professionals to help you recover your data.</li><li>Damage to computer systems and data.</li><li>Disruption following a cyberattack can bring certain systems and applications to a halt, affecting productivity.</li><li>Liability and reputation management costs following a cyberattack.</li>

</ul>

Insurance technology with a difference.

Say goodbye to complex legacy technology, and hello to a different kind of software solution.

Book a demo