Not enough businesses take cybercrime seriously

Issue 1 2025 Information Security


Ivan Jardim.

Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year. At the end of last year, it was revealed that South Africa was hit by 2679 reported cyberattacks in the past two years, but that only 83 were passed to the National Prosecuting Authority (NPA) because of capacity constraints, with a shortage of more than 150 cybercrime detectives.

This paints a grim picture for South African businesses, who clearly need to do all they can to protect themselves. Cybercrime is not treated urgently enough by many businesses in this country. Here’s a look at the state of the nation regarding cybercrime and how businesses could improve their prospects of remaining protected:

Lack of awareness and proactive measures

Despite alarming headlines about the cost of cybercrime or high-profile ransomware cases that make the news, there is just not enough awareness about how serious the problem is or how close to home it is. Many South African businesses are more focused on day-to-day operations, or even survival, rather than investing in proactive cybersecurity measures.

This is because many businesses operate under the illusion that they are safe. They have a false sense of security that emanates from relying on basic digital hygiene, such as passwords and biometric recognition, to access their devices. More businesses must understand the extent to which their data and activities are being accessed, exploited, and shared, even through seemingly innocuous actions like connecting to public Wi-Fi networks.

The facts are clear and unambiguous. In a global environment where cybercrime is surging, and where South Africa is an open playing field for criminals, there absolutely needs to be an investment in proactive and agile cybersecurity measures.

AI’s impact on cybersecurity

Cybercriminals are not just people who wake up one morning and decide to take a chance on a quick win. They are highly organised cartels of criminals who use increasingly sophisticated means to achieve their goals. Cybercriminals are increasingly leveraging generative AI to create highly sophisticated phishing attacks. They are using AI to exploit vulnerabilities in South African businesses.

AI is making it easier for attackers to target business insiders to gain access to systems, giving them the ability to get right through basic security measures like passwords or facial recognition. This is a huge threat, and compared to their counterparts in other markets and regions of the world, local businesses often lack the necessary cybersecurity awareness and infrastructure to detect and respond in time to AI-powered attacks. AI can and should be leveraged as a defence against these sophisticated attacks.

Exploiting South African vulnerabilities

For example, a local business that was hosting its customer systems on a local internet service provider suffered a major performance degradation as a result of cyberattacks. What the business did not anticipate when hosting with the ISP was the relentless hacker bot attacks on the ISP's infrastructure, which then severely impacted the business’s own operations. This shows that criminals specifically target South African businesses and their supporting infrastructure.

South Africa’s banking and financial services industry is highly competitive and innovative, and ironically, this has put a target on the backs of businesses in these sectors. Innovation is prime real estate for cybercriminals who seek to exploit the latest technologies and data-driven business models.

The attack that is detected too late

Cybercriminals are professionals at would be easier to detect. A growing trend is where the initial attack occurs a long time, sometimes months, before the actual ransomware event.

This makes it extremely difficult for businesses to recover their data – even with robust backup systems. The wake-up call for local businesses is that these sophisticated, long-term attacks are particularly prevalent in the South African context, where many businesses do not have the necessary security infrastructure to detect and respond to attacks in a timely manner. Criminals know this, so they play the waiting game.

More education and awareness

The first big education job needs to happen at an executive level. South African business decision-makers need to become acutely aware of the state of the cybersecurity landscape, and just how vulnerable their businesses really are. This is critical to avoid businesses carrying on as usual under the illusion of security.

South African employees, too, have shown themselves to be easily tricked into providing sensitive information or granting access to systems, even in the face of basic security measures. Factor in generative AI that can make attacks seem more believable than ever before, and the problem is compounded. Yet, organisations tend to rely on the trustworthiness of their employees and the perceived safety of their devices.

South Africa plays in the same digital arena as the rest of the world, but South African businesses are not exposed to the same level of awareness and education as in other regions. Attacks that could be thwarted easily in other markets, are often successful on these shores. This makes us an attractive target.

The need for a holistic cybersecurity strategy

One would never find a physical business with valuable and sought-after stock in South Africa protected only by burglar bars, an alarm system and solid security gate. The same should be true for cybersecurity. It needs to cover all the bases. Businesses need a platform with comprehensive security solutions, 24/7 support, and rapid detection and response capabilities.

Furthermore, the best cybersecurity solutions are brand agnostic, meaning they can integrate with a wide range of existing security infrastructure and devices. Not being tied to particular vendors allows businesses to develop more comprehensive strategies.

Lastly, businesses would do well to seek out platforms and partners that provide advisory services and tailored solutions that address their specific vulnerabilities. A holistic cybersecurity strategy is non-negotiable in an environment where criminals hide deep in a world we cannot see, yet they need to be detected and stopped in time.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.