Connect with us

Cybersecurity

Zero-trust essential for security

Last week’s Dell Technologies TechByte event highlighted the need for organisations to fortify their data with modern security.

Heard of Zero-trust? It’s not a product, but an attitude to data protection that ensures an organisation’s data is fortified with modern security. 

At  the TechByte webinar hosted by Dell Technologies South Africa last week, the audience was given a deep dive into how organisations can protect their data and systems, enhance cyber resiliency and overcome security complexity.

Michael Leong, virtual cloud network account executive for VMware, and Koketso Letoaba, technical specialist for Intel, both agreed that a zero-trust approach to security was key.

“The principle of zero trust is at the heart of building a security system rather than a series of point solutions,” said Leong. “Organisations should assume they’ve been breached and that there is an absolute risk of compromise. VMware has a unique ability to implement zero trust security at access points as well in the data centre.”

Letoaba said: “We are seeing security perimeters erode as cyberthreats evolve and become more complex. Balancing user experience and IT security priorities is difficult, especially as home and business PC usage converges.”

Dell Technologies’ partners, VMware and Intel, joined the discussion to highlight strategic ways to step up innovation in business, a critical component in achieving optimal levels of cyber resiliency. The forum was joined by Arthur Goldstuck, founder and CEO of World Wide Worx, and Dr Haitham Rashwan, regional manager of cyber security services for Dell Technologies.

Dr Rashwan said that threat vectors were increasing at an alarming level. According to Cybersecurity Ventures, in 2021, a cyber or ransomware attack occurred every 11 seconds and the global impact of cyber crime was $6-trillion. Now more than 150-million phishing emails are sent worldwide every day, and all it takes to cause an organisation major damage is for one person to click on the link.

Doug Woolley, managing director of Dell Technologies South Africa, emphasised that the growing work from home trend has opened up vulnerabilities in companies and networks: “Organisations need to think one step ahead and set up systems, procedures and skill sets to deal with the multitude of attacks coming through. The way we protect data in 2022 is very different to how it was done five years ago.”

This is compounded by the fact that organisations are managing 10 times more data than they were five years ago. In addition, more than 60% of organisations have experienced a data loss due to an exploited vulnerability, while 65% of IT decision makers are not confident that their data and systems can be fully recovered following such an event.

The State of Cybersecurity in South Africa, a study conducted by World Wide Worx with the support of Dell Technologies South Africa and Intel, showed that 99% of corporates are aware that disaster management is essential. However, only 40% of businesses use multiple solutions to protect, back up and replicate their data in the event of disaster.

“Compromises and vulnerabilities are revealed through the weakest link in the IT system, which is often an organisation’s own employees,” said Goldstuck. “This may allow ransomware programs and phishing attempts to enter the system. More than half of businesses report that ransomware and phishing attempts have increased in the past year.”

The study also indicated that a more secure cybersecurity environment enables employees to feel more productive and, therefore, more innovative. 

“Once they have a secure culture, employees can focus on what they do best. Implementing effective cybersecurity measures is not an investment for its own sake, there are massive business benefits.”

Commenting on protecting business in the digital era, Woolley said: “Businesses need to protect data and apps across the organisation, monitor networks for threats, increase automation and have a working response plan in place which is tested proactively. It is also critical to take a holistic view of people, processes and technology rather than technology alone.”

Subscribe to our free newsletter
To Top