Home 9 Digital rights 9 Achieving the right cybersecurity balance

Achieving the right cybersecurity balance

28 Jul, 2016
A worldwide explosion of apps and e-commerce sites has created a disjointed control over data that is shared between organisations, leading to security breaches. Furthermore, personal information disclosed on social platforms and via unsecured channels has created a real danger of identity theft, practically handing fraudsters the tools needed for cyber crime. As Marty Young, […]

A worldwide explosion of apps and e-commerce sites has created a disjointed control over data that is shared between organisations, leading to security breaches. Furthermore, personal information disclosed on social platforms and via unsecured channels has created a real danger of identity theft, practically handing fraudsters the tools needed for cyber crime.

As Marty Young, Data and Analytics Executive at F5, which provides solutions for an application world, points out: “This is the hybrid world, where technologies are integrated to provide the benefits of multiple deployment models. As enterprises move to the cloud, optimising their operations and utilising more technologies into their business processes, so does the interplay between applications become more complex, with security as a vital component since they are the basis of continued operations in the digital age.

In Africa, Networks Unlimited distributes F5 solutions. “Now, more than ever web application security matter on the African continent,” says Anton Jacobsz, MD at Networks Unlimited. “We are experiencing a massive spike in Internet access across the region, especially apps accessed via mobile devices, and with victim demographics ranging far and wide, more and more individual and company data is at risk of being compromised.”

Young adds that the rapid rise of the Internet of Things (IoT) in the marketplace has resulted in an increase in the backend data workload, which is putting tremendous pressure on networks.

“Nowhere is this felt more keenly than on legacy IT infrastructures and the security environments, and it will only become more pronounced throughout 2016,” he maintains. “The number of ‘things’ connected to devices that are capable of being harnessed thanks to their connectivity and reliance on APIs have the potential to become a BOT for cyber-attacks such as DDoS.”

Although they will undoubtedly be alarming, Young says that such attacks will drive a demand for assured security amongst consumers, eventually leading to security being a key “must-have” feature for Internet devices. “Unless organisations remain proactive, the ubiquity of connected devices presents a gold mine for attackers,” he continues. “Therefore we expect to see more enterprises focusing on ensuring that their IT infrastructure is stable and secure enough to support the exploding data workloads as a result of IoT on their networks. And, on the consumer side of things, manufacturers of TVs and wearable devices will be putting security at the top of their priority lists.”

Young also stresses that a well-run security strategy is not just about perimeter security; rather, it is to protect availability and confidentiality of information whilst supporting business processes. “Understanding and controlling risks allows organisations to innovate by leveraging technology for competitive differentiation and new customer offerings. Organisations that depend on their online presence for survival need a holistic security strategy. One that not only protects the organisation, its employees, customers and end-users against attack vectors, but is also able to react quickly to attacks in order to minimise damage,” he concludes.

Source : IT News Africa

About MISA

The Media Institute of Southern Africa (MISA) was founded in 1992. Its work focuses on promoting, and advocating for, the unhindered enjoyment of freedom of expression, access to information and a free, independent, diverse and pluralistic media.

Share this

Related news

Now Available: AI Report on Southern Africa

Now Available: AI Report on Southern Africa

Executive Summary Artificial Intelligence (AI) has rapidly become a constant in most people`s lives through its application in commerce, education, health, public service delivery, communications, governance, agriculture, and manufacturing. While most AI tools...

ACHPR raises concern over mass surveillance

ACHPR raises concern over mass surveillance

The African Commission on Human and Peoples’ Rights (ACHPR) has raised concern about the prevalence of mass surveillance and unlawful targeted communication surveillance that does not conform with international human rights law and standards. The ACHPR said this...

Parly issues adverse report on court electronic management system

Parly issues adverse report on court electronic management system

The Parliamentary Legal Committee has issued an adverse report on Statutory Instrument 153 of 2023 High Court (Amendment) Rules, 2023 (NO.1), which relates to the Judicial Service Commission’s Integrated Electronic Case Management System (IECMS). The Committee met on...