News

Cyber Security

Table of Contents

Recent studies1 have shown that South Africa is experiencing a skills gap in the field of cybersecurity. As a forward-thinking higher education entity, Regent Business School (RBS) recently presented a webinar designed to help business leaders from small business owners to corporate executives, understand the current cybersecurity landscape and learn the steps necessary to protect their organizations from potential cyberattacks. With the help of experts in the field, the webinar not only provided an overview of the cyberthreats businesses face, but also provided actionable strategies to mitigate cyber risks. Attendees were empowered with a better understanding of the importance of cybersecurity and the steps necessary to ensure their organizations are as secure as possible.

“In the current digital world, security threats have become a major concern for businesses and individuals alike. Valuable insights into the latest cybersecurity trends and best practices, as well as the resources available to protect data and systems from malicious attacks were explored during this webinar which was by invitation to our alumni. A discussion around the potential risks and vulnerabilities associated with cyber security, and the steps you can take to stay safe and secure in the digital age,” commented Professor Osman Seedat, Deputy Dean at Regent Business School and moderator of the webinar.

New cybersecurity technologies are emerging to combat the increasing threat of cyberattacks on organizations, as they face the challenge of keeping their environments protected in the age of cloud computing and IoT (internet of things) devices. According to recent statistics, small and medium-sized enterprises (SMMEs) are particularly vulnerable, with many lacking basic or any security measures to protect their systems.

One of the major challenges faced by organizations is the issue of cloud vulnerabilities, as more companies adopt the latest technologies hosted or managed in the cloud. However, not all organizations are prepared for the cloud adoption framework, leading to complexities and increased expenditure. Remote work has further complicated cybersecurity, with many employees connecting on networks outside of the organization’s firewall, exposing sensitive data. Companies need to ensure that employees follow best practices, such as using a Virtual Private Network (VPN), enforcing password policies, using multi-factor authentication and providing cybersecurity training.

“As individuals, we must take responsibility for our own online safety by setting goals and following best practices to protect our sensitive data. This includes identifying all connected devices, limiting unnecessary applications, using password managers, and using public Wi-Fi with caution. However, small to medium enterprises must also prioritize cybersecurity by implementing policies and following frameworks like NIST Cybersecurity Framework. In the event of a breach, it’s important to respond quickly and efficiently, while keeping clients and employees informed. Ultimately, cybersecurity is a team effort, and everyone must play their part.” says Liaqat Wahid Hassan, Managing Director of Cyberedge Security who was on the panel of experts.

Organizations must measure their cybersecurity effectiveness, list their current capabilities, identify vulnerable assets, and practice regular patching and updates. In the event of an attack, organizations should be able to know their response time and the time it will take to remediate the issue.

According to another panel expert Craig Law, Chief Information Security Officer of Corporate and Investment Banking at Standard Bank the onus is on you to protect yourself from cybercriminals. He stressed the Importance of recognizing phishing emails and social engineering through social media: “As technology continues to evolve, cybercriminals have found new ways to steal personal information and commit fraud. Phishing emails and social engineering through social media are two common tactics that these criminals use to deceive people. Phishing emails are fraudulent emails that appear to be from legitimate sources, but in reality, they are sent by cybercriminals to steal personal information. Social engineering through social media involves creating fake profiles or posing as legitimate individuals or organizations to gain the trust of targets. Once trust is established, attackers may request personal information or convince victims to click on malicious links.

“It is crucial for people to be aware of these tactics to prevent the devastating consequences of falling victim to them. By staying vigilant and learning to recognize these tactics, individuals can better protect their personal information and avoid falling victim to fraudulent schemes. Don’t become a victim of cybercrime. Stay informed, stay vigilant, and protect yourself from phishing emails and social engineering through social media,” Law warned.

Emerging technologies such as Artificial Intelligence and Machine Learning are set to revolutionize cybersecurity by offering advanced predictive abilities that monitor user behaviour without human intervention. These technologies will be widely used in the coming years to make cybersecurity stronger and more powerful.

With the adoption of these emerging technologies, organizations will have the tools they need to stay protected from cyberattacks and ensure their cybersecurity best practices. As technology continues to evolve, it is imperative that organizations remain vigilant and proactive in implementing the latest cybersecurity solutions to stay ahead of potential threats.

Archives

Study Enquiry Form

Complete all fields on the study Enquiry form, and a dedicated programme advisor will contact you.

  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Chat with us, we are online1
;