Subscribe
About
  • Home
  • /
  • Networking
  • /
  • Zero trust cyber security approach vital for besieged local businesses

Zero trust cyber security approach vital for besieged local businesses

By Andre Lombaard, Technical Manager: Security at Datacentrix.
Andre Lombaard, Technical Manager: Security at Datacentrix.
Andre Lombaard, Technical Manager: Security at Datacentrix.

At the end of 2021, a report released by the International Criminal Police Organisation (INTERPOL) painted a fairly bleak picture of the cyberthreat landscape in South Africa.

Entitled the African Cyberthreat Assessment Report 2021, the survey highlighted that, while the broader African continent had experienced some attacks against critical infrastructure and frontline services, South Africa was among the countries hardest hit, experiencing around 230 million threat detections in total between January 2020 and February 2021. Comparatively, Kenya and Morocco were subjected to a much lower number of attacks, at 72 million and 71 million respectively over the same period.

In South Africa, 219 million detections were related to e-mail threats, and the country was also listed as the most targeted with ransomware and business e-mail compromise (BEC) attempts. In fact, the INTERPOL report referred to figures from Accenture, which stated that South Africa has the third highest number of cyber crime victims worldwide, at a cost of R2.2 billion a year.

It is clear that local business needs to reconsider its cyber security approach and that the pre-COVID virtual private network (VPN) set-up that permits users to access all areas of the network is no longer a secure strategy.

In fact, today’s world of remote working and cloud-based systems necessitates a ‘zero trust’ approach to keep a business’ data and infrastructure secure. This type of strategy, based on the premise of ‘never trust, always verify’, revokes any type of access privileges that users may have previously had on a network, and keeps their access to the absolute minimum, while frequently requesting user authentication.

Check, check and check again

In a zero trust world, legitimate, authorised users may access only those areas of the network, as well as apps and data, that are needed to complete a task (for instance, an organisation’s enterprise resource planning [ERP] software, e-mail and a document repository) and nothing more.

Here, technologies like secure access service edge (SASE), in combination with biometrics on end point devices as well as privileged identity management (PIM) solutions are playing a critical role in helping companies to scale down access and increase the security of their systems.

These technologies allow for the security perimeter to be moved away from the enterprise to the user or device. They then require users to be regularly identified and verified, before permitting them to enter the network perimeter, and provide only preassigned access to certain areas.

Policy management critical

Designing a zero trust architecture must include, at its core, centralised policy management, which encompasses identity-related and allocation policies. It must also align with local governance requirements, such as The Payment Card Industry Data Security Standard (PCI DSS), the International Organization for Standardization (ISO) or General Data Protection Regulation (GDPR), regarding the safety and security of data and cloud infrastructure.

The alignment of processes and policies is essential, while it might be possible to control the technology, it is not necessarily possible to control the human behind the device; this remains a major anomaly when it comes to cyber security. However, while you may not be able to change user behaviour, it is possible to enforce processes and policies to best control engagements – leading to one path and one path only.

A zero trust approach to cyber security can essentially assist any business to create a safer remote and cloud environment, simplifying the security architecture and reducing organisational risk.

For more information on Datacentrix’s security services offering, please visit https://www.datacentrix.co.za/security-services.html.

Share

Datacentrix

Datacentrix is a leading hybrid IT systems integrator and managed services provider that enables digitalisation success.

Our expert teams leverage the power of ICT technologies to connect, transform, optimise, and future-proof business, supporting clients throughout their digital journey.

Datacentrix offers deep technical expertise across a mature offering and provides proven execution capability that is endorsed by the world’s foremost technology partners. With a strong African footprint, the company is recognised for its agility, in-depth industry knowledge, ethical practices, and strong overall performance.

The company is a Level One (AAA) B-BBEE Contributor, with 135 percent procurement recognition.

For more information, please visit www.datacentrix.co.za.

Editorial contacts

Nicola Read
icomm
datacentrix@pr.co.za