Not enough businesses take cybercrime seriously

Issue 1 2025 Information Security


Ivan Jardim.

Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year. At the end of last year, it was revealed that South Africa was hit by 2679 reported cyberattacks in the past two years, but that only 83 were passed to the National Prosecuting Authority (NPA) because of capacity constraints, with a shortage of more than 150 cybercrime detectives.

This paints a grim picture for South African businesses, who clearly need to do all they can to protect themselves. Cybercrime is not treated urgently enough by many businesses in this country. Here’s a look at the state of the nation regarding cybercrime and how businesses could improve their prospects of remaining protected:

Lack of awareness and proactive measures

Despite alarming headlines about the cost of cybercrime or high-profile ransomware cases that make the news, there is just not enough awareness about how serious the problem is or how close to home it is. Many South African businesses are more focused on day-to-day operations, or even survival, rather than investing in proactive cybersecurity measures.

This is because many businesses operate under the illusion that they are safe. They have a false sense of security that emanates from relying on basic digital hygiene, such as passwords and biometric recognition, to access their devices. More businesses must understand the extent to which their data and activities are being accessed, exploited, and shared, even through seemingly innocuous actions like connecting to public Wi-Fi networks.

The facts are clear and unambiguous. In a global environment where cybercrime is surging, and where South Africa is an open playing field for criminals, there absolutely needs to be an investment in proactive and agile cybersecurity measures.

AI’s impact on cybersecurity

Cybercriminals are not just people who wake up one morning and decide to take a chance on a quick win. They are highly organised cartels of criminals who use increasingly sophisticated means to achieve their goals. Cybercriminals are increasingly leveraging generative AI to create highly sophisticated phishing attacks. They are using AI to exploit vulnerabilities in South African businesses.

AI is making it easier for attackers to target business insiders to gain access to systems, giving them the ability to get right through basic security measures like passwords or facial recognition. This is a huge threat, and compared to their counterparts in other markets and regions of the world, local businesses often lack the necessary cybersecurity awareness and infrastructure to detect and respond in time to AI-powered attacks. AI can and should be leveraged as a defence against these sophisticated attacks.

Exploiting South African vulnerabilities

For example, a local business that was hosting its customer systems on a local internet service provider suffered a major performance degradation as a result of cyberattacks. What the business did not anticipate when hosting with the ISP was the relentless hacker bot attacks on the ISP's infrastructure, which then severely impacted the business’s own operations. This shows that criminals specifically target South African businesses and their supporting infrastructure.

South Africa’s banking and financial services industry is highly competitive and innovative, and ironically, this has put a target on the backs of businesses in these sectors. Innovation is prime real estate for cybercriminals who seek to exploit the latest technologies and data-driven business models.

The attack that is detected too late

Cybercriminals are professionals at would be easier to detect. A growing trend is where the initial attack occurs a long time, sometimes months, before the actual ransomware event.

This makes it extremely difficult for businesses to recover their data – even with robust backup systems. The wake-up call for local businesses is that these sophisticated, long-term attacks are particularly prevalent in the South African context, where many businesses do not have the necessary security infrastructure to detect and respond to attacks in a timely manner. Criminals know this, so they play the waiting game.

More education and awareness

The first big education job needs to happen at an executive level. South African business decision-makers need to become acutely aware of the state of the cybersecurity landscape, and just how vulnerable their businesses really are. This is critical to avoid businesses carrying on as usual under the illusion of security.

South African employees, too, have shown themselves to be easily tricked into providing sensitive information or granting access to systems, even in the face of basic security measures. Factor in generative AI that can make attacks seem more believable than ever before, and the problem is compounded. Yet, organisations tend to rely on the trustworthiness of their employees and the perceived safety of their devices.

South Africa plays in the same digital arena as the rest of the world, but South African businesses are not exposed to the same level of awareness and education as in other regions. Attacks that could be thwarted easily in other markets, are often successful on these shores. This makes us an attractive target.

The need for a holistic cybersecurity strategy

One would never find a physical business with valuable and sought-after stock in South Africa protected only by burglar bars, an alarm system and solid security gate. The same should be true for cybersecurity. It needs to cover all the bases. Businesses need a platform with comprehensive security solutions, 24/7 support, and rapid detection and response capabilities.

Furthermore, the best cybersecurity solutions are brand agnostic, meaning they can integrate with a wide range of existing security infrastructure and devices. Not being tied to particular vendors allows businesses to develop more comprehensive strategies.

Lastly, businesses would do well to seek out platforms and partners that provide advisory services and tailored solutions that address their specific vulnerabilities. A holistic cybersecurity strategy is non-negotiable in an environment where criminals hide deep in a world we cannot see, yet they need to be detected and stopped in time.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.