Company Profile
Training Catalogue
POPIA Compliance
WWISE

    How do I secure my organisation from cyberattacks?

    Sep 17, 2021 | Articles, Other articles

    The spread of the Covid-19 pandemic has drastically affected most countries financially, businesses are struggling to bounce back to full operations, numbers of death are rising daily and there’s a shocking increase in the number of Cybercrimes due to individuals working from home.

    Cybercrime can be defined as any action that involves unlawful access to a computer or device such as a USB drive or an external hard drive. It also includes the illegal interception of data such as unlawful acquisition, possession, receipt, or use of a password and forgery, fraud, and extortion online.
    Researchers state that these are the five most common types of cybercrimes:

    • Phishing scams
    • Internet fraud
    • Online intellectual property infringements
    • Identity theft
    • Online harassment and cyberstalking

    Cybercrimes seem to be increasing due to limited cybersecurity measures. However, the president of South Africa has signed the Cybercrimes Act into law. This means that South Africa now has a comprehensive law to regulate cybercrime. Unanswered questions still emerge, organisations are eager to discover the commencement date of the enacted law, whether there will be a grace period like the POPI Act, and what actions will be taken thereto. South Africa is ready to fight and eradicate the spread of cybercrimes by taking practical and effective actions in securing data and any sensitive information.

    According to Michalsons Law firm writing, “ The Cybercrimes Act comes at a crucial time with many of us working remotely. This brings additional security concerns. And we’re seeing an increase in the number of high-profile cyberattacks in the public and private sectors. These numbers have increased at an alarming rate during the COVID-19 pandemic. This law is needed to protect South Africans and their organisations from harm”. This Act will affect the way individuals and organisations interact with data or use electronic devices. It is, therefore, advisable that everyone understands cybercrimes, understands the Act as well as any other cybersecurity measures required to avoid committing any cybercrime unintentionally. Organisations must comply with these measures by putting the necessary controls in place to secure their internal systems from any cyberattacks.

    “ Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes” (I.J ARCCE Advance Researched).
    Most organisations and enterprises in South Africa implemented the following cybersecurity techniques intending to minimise security breaches and cyberattacks:

    • Critical Infrastructure Cybersecurity
    • Network Security
    • Cloud Security
    • Internet of Things Security
    • Application Security

    It is further discussed that computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of services they provide. According to I.J ARCCE, Cyber security techniques are generally outlined in published materials that attempt to safeguard the cyber environment of a user or organisation. It manages the set of techniques used to save the integrity of networks, programs, and data from unauthorised access.

    Cybersecurity refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smartphones, televisions, and numerous devices that constitute the Internet of Things. The range of operations of cyber security involves protecting information and systems from major cyber threats. These threats take many forms. As a result, keeping pace with cyber security strategy and operations can be a challenge, particularly in government and enterprise networks.

    How can WWISE assist your organisation in implementing Cybersecurity?

    • WWISE has the expertise, experience, and passion to assist organisations who want to implement cybersecurity measures using information security management systems like ISO 27001. Such is accomplished by structuring an implementation plan and providing systems, along with expert guidance to support organisations in achieving their goals.
    • WWISE can also facilitate the entire process regarding Cybercrimes Act compliance as well as cybersecurity measures required by the law.

    For more information on Cybersecurity implementation and compliance in your business, contact WWISE on 08610 99473 or visit https://www.wwise.co.za

      COPYRIGHT ©2021 WWISE. ALL RIGHTS RESERVED.