Preventing cyberattacks on critical infrastructure

Issue 4 2022 Industrial (Industry), Information Security


Carlo Bolzonello.

The notion of cyberattacks seems distant from our daily lives as we go about our work, social and family lives. Cyberattacks feel like they happen to big businesses which can quickly bounce back from them after the issue is identified and fixed, just as quickly as we would bounce back from being sick, once the illness was diagnosed and treated.

Cyberattacks have the potential to disrupt our lives completely, and in instances where critical national infrastructure is attacked, they could disrupt the country’s entire economy, leading to loss of life and livelihoods.

In the last few years, we’ve already seen successfully targeted advanced cyberattacks on some of our nation’s most critical economic functions, with devastating consequences. It’s not difficult to imagine what would happen if an attack was to be directed at one of South Africa’s state-owned enterprises or other essential parts of the country’s infrastructure: the country would be crippled and the economy severely damaged.

With nearly every element of South African society – from our banks and businesses to state-owned entities and government departments among others – all making use of the speed, efficiency and convenience of digital solutions, the country’s digital infrastructure needs a holistic, integrated security ecosystem and a cloud-first approach that makes it possible for all security products to work together.

This would be possible via an extended detection and response (XDR) approach to security, that uses machine learning and automation to complement human skills to protect private and public sector environments, helping them adapt and stay agile, and able to respond to active threats through dynamic prevention policies.

By harnessing the power of machine learning and automation to unlock insights and streamline workflows, organisations can stay one step ahead of adversaries, adapt to new threats, and accelerate detection and correction through the entire defence lifecycle.

This ‘living security’ approach makes public sector and private organisations more resilient through the interconnection of a wide variety of threat sensors and capabilities, so they know their operations are protected. It is native and open, and leverages an optimal blend of expert advice, assistance, and automation so security teams are more effective and efficient when incidents happen.

While South Africa does have the Critical Infrastructure Protection Act and the Cybercrimes Act in place, the former legislates the protection of infrastructure, while the latter deals specifically with cybercrime, making it easier for investigating agencies to gather evidence of cybercrime, and to seek support from their counterparts in other countries.

The true effectiveness of this legislation is yet to be determined, however, but the time to address cybercrime is before it happens, crippling the country’s infrastructure and resources, and before it’s too late to prevent catastrophic physical and reputational damage to the structures that keep our nation alive.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New AI advisor for robot selection
News & Events Industrial (Industry) AI & Data Analytics
Igus’ new AI chatbot has been added to its online platform to enable companies with little previous experience and technological expertise to quickly and reliably put together Low-Cost Automation (LCA) solutions to become more competitive.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.

Read more...
Only 4% of surveyed organisations reported no cyberattacks
News & Events Information Security
As cyber threats escalate in frequency and sophistication, new research reveals an alarmingly high rate of security incidents over the past year, due to a lack of awareness and qualified professionals as key contributing factors.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...