Home 9 Digital rights 9 Achieving the right cybersecurity balance

Achieving the right cybersecurity balance

28 Jul, 2016
A worldwide explosion of apps and e-commerce sites has created a disjointed control over data that is shared between organisations, leading to security breaches. Furthermore, personal information disclosed on social platforms and via unsecured channels has created a real danger of identity theft, practically handing fraudsters the tools needed for cyber crime. As Marty Young, […]

A worldwide explosion of apps and e-commerce sites has created a disjointed control over data that is shared between organisations, leading to security breaches. Furthermore, personal information disclosed on social platforms and via unsecured channels has created a real danger of identity theft, practically handing fraudsters the tools needed for cyber crime.

As Marty Young, Data and Analytics Executive at F5, which provides solutions for an application world, points out: “This is the hybrid world, where technologies are integrated to provide the benefits of multiple deployment models. As enterprises move to the cloud, optimising their operations and utilising more technologies into their business processes, so does the interplay between applications become more complex, with security as a vital component since they are the basis of continued operations in the digital age.

In Africa, Networks Unlimited distributes F5 solutions. “Now, more than ever web application security matter on the African continent,” says Anton Jacobsz, MD at Networks Unlimited. “We are experiencing a massive spike in Internet access across the region, especially apps accessed via mobile devices, and with victim demographics ranging far and wide, more and more individual and company data is at risk of being compromised.”

Young adds that the rapid rise of the Internet of Things (IoT) in the marketplace has resulted in an increase in the backend data workload, which is putting tremendous pressure on networks.

“Nowhere is this felt more keenly than on legacy IT infrastructures and the security environments, and it will only become more pronounced throughout 2016,” he maintains. “The number of ‘things’ connected to devices that are capable of being harnessed thanks to their connectivity and reliance on APIs have the potential to become a BOT for cyber-attacks such as DDoS.”

Although they will undoubtedly be alarming, Young says that such attacks will drive a demand for assured security amongst consumers, eventually leading to security being a key “must-have” feature for Internet devices. “Unless organisations remain proactive, the ubiquity of connected devices presents a gold mine for attackers,” he continues. “Therefore we expect to see more enterprises focusing on ensuring that their IT infrastructure is stable and secure enough to support the exploding data workloads as a result of IoT on their networks. And, on the consumer side of things, manufacturers of TVs and wearable devices will be putting security at the top of their priority lists.”

Young also stresses that a well-run security strategy is not just about perimeter security; rather, it is to protect availability and confidentiality of information whilst supporting business processes. “Understanding and controlling risks allows organisations to innovate by leveraging technology for competitive differentiation and new customer offerings. Organisations that depend on their online presence for survival need a holistic security strategy. One that not only protects the organisation, its employees, customers and end-users against attack vectors, but is also able to react quickly to attacks in order to minimise damage,” he concludes.

Source : IT News Africa

About MISA

The Media Institute of Southern Africa (MISA) was founded in 1992. Its work focuses on promoting, and advocating for, the unhindered enjoyment of freedom of expression, access to information and a free, independent, diverse and pluralistic media.

Share this

Related news

Bottom-up approach imperative for AI development in Africa

Bottom-up approach imperative for AI development in Africa

MISA Regional Director Dr Tabani Moyo has called for the prioritisation of bottom-up processes to shape the African Union (AU) Artificial Intelligence (AI) blueprint titled: Continental Artificial Intelligence Strategy: Harnessing AI for Africa’s Development and...

MISA Zimbabwe analysis and position on new data regulations 

MISA Zimbabwe analysis and position on new data regulations 

The Cyber and Data Protection Act [Chapter 12:07] was gazetted on December 3rd , 2021, and came into force on the same day.  In essence, the data protection law mandates that all businesses operating in Zimbabwe (and outside) adhere to data protection and privacy...

Zimbabwe should stay the course in reducing media freedom violations

Zimbabwe should stay the course in reducing media freedom violations

This year’s International Day to End Impunity for Crimes Against Journalists (IDEI), commemorated annually on 2 November, offers Zimbabwe the opportunity to reflect on how best it can improve its international press freedom rankings. The commemorations are being held...