Kenya, Zambia and South Africa under cyber attack

Issue 5 2023 Information Security

Liquid C2, a business of Liquid Intelligent Technologies, a pan-African technology group, has revealed that the number of cyberattacks on businesses in Kenya, South Africa, and Zambia increased by 76%. This is according to the latest cyber security report, The Evolving Cyber Security Landscape in Africa 2022.

Featuring research, analysis, and findings across the three countries on the evolving cybersecurity threats present in Africa, the report shows that cyberattacks against all large enterprises ramped up dramatically. Kenyan businesses reported an 82% increase in such attacks, while South African businesses recorded a 62% increase, and Zambian businesses a 62% increase.

“The biggest concern emerging from this report is that companies are saying that they’ve put a lot more cybersecurity controls in place. With threats evolving faster than security systems, companies cannot afford to get complacent,” says David Behr, CEO of Liquid C2. “The report highlights that businesses must be consistently vigilant about the ever-evolving cybercrime landscape and the methods malicious actors use to breach cybersecurity measures. As the report shows, complacency is a luxury no one can afford.”

There are reasons to be optimistic; all the respondents in the report highlighted that they had advanced significantly in their cloud and digital strategies and cybersecurity capabilities. Furthermore, the majority (68%) of the companies interviewed in the research said they had appointed cybersecurity staff members or signed up with a cybersecurity team in the past year.

Partner with experts

Yet, as Behr says, this could prove to be a double-edged sword. The research highlights that over half of all large enterprises in the three countries were victims of a successful cyberattack, with 90% of them being Kenyan businesses. Increasingly sophisticated methods like Cybercrime-as-a-Service (CaaS) are becoming more popular in Africa, meaning businesses can no longer rely on outdated technologies and processes. “It is time they invested in a partner that provides 24/7/365 protection, rapid response, threat intelligence and prevention, compliance and improved business reputation, all designed to cater to the specific needs of businesses.”

The top method of attack used by cybercriminals targeting companies was through email, using phishing or spam attacks (61%), with attacks through compromised passwords following at 48% and data breaches and attacks (44%) being the second and third most common. Furthermore, 61% of the companies included in the research said that the breaches to their operations occurred as a result of remote or hybrid working.

One of the most concerning revelations in the report is that Africa faces a growing 100 000 person gap in the number of certified cybersecurity professionals. Reports estimate that there are only 7000 certified cyber security professionals, or one for every 177 000 people on the continent. However, this number may disguise the true magnitude of the problem as there is no readily available data on the level of investment made by African governments into cybersecurity.

The report underlines the increasing need for companies to invest in cybersecurity measures to avoid reputational damage, financial loss, and potential business interruptions. Additionally, it reinforces how vital it is for organisations to collaborate with trusted third-party managed security services providers (MSSPs) to implement and refine their cybersecurity strategies.

The report can be downloaded via www.securitysa.com/*lc2




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...