<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cyberinsight.co.za/blogs/feed" rel="self" type="application/rss+xml"/><title>www.cyberinsight.co.za - Blog</title><description>www.cyberinsight.co.za - Blog</description><link>https://www.cyberinsight.co.za/blogs</link><lastBuildDate>Wed, 06 May 2026 06:02:17 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Network Perimeter Is Gone]]></title><link>https://www.cyberinsight.co.za/blogs/post/the-network-perimeter-is-gone1</link><description><![CDATA[Hybrid work has dissolved the traditional network perimeter. Learn why organisations must shift from perimeter-based security to a workspace-centric security model.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zmuG0zzZTWG19TZ03f68UQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XsQ0D8VESZ-IbkZq5kxRWg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_S8AApqtDTXid-GhF0GrGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pP1RibfIwbTDMRrJf2b3Jg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pP1RibfIwbTDMRrJf2b3Jg"] .zpimage-container figure img { width: 1240px ; height: 734.81px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.cyberinsight.co.za/Blogs/Blog%20Images%20-3-.png" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_dKo04ks0xB1iXvkeXx6UbA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_dKo04ks0xB1iXvkeXx6UbA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_dKo04ks0xB1iXvkeXx6UbA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_rWKklsWYQm6Ju3AYmdV0lA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rWKklsWYQm6Ju3AYmdV0lA"] h2.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; } [data-element-id="elm_rWKklsWYQm6Ju3AYmdV0lA"] .zpheading:after,[data-element-id="elm_rWKklsWYQm6Ju3AYmdV0lA"] .zpheading:before{ background-color:#000000 !important; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why Workspace Security Must Evolve</span></h2></div>
<div data-element-id="elm_IlRQ0muuRa24wt0IhT_jSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IlRQ0muuRa24wt0IhT_jSw"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-weight:400; } [data-element-id="elm_IlRQ0muuRa24wt0IhT_jSw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-weight:400; } </style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"> Hybrid work has permanently expanded the enterprise attack surface. The perimeter is no longer where risk lives — the workspace is. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> For decades, cybersecurity strategies were built around a predictable structure: protect the network perimeter and you protect the business. Firewalls defined the edge. VPNs extended controlled access. Everything inside the network was considered safer. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> But this model no longer reflects how organisations operate today. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> Applications now run across SaaS platforms, private data centres, and public cloud infrastructure. Employees work from corporate offices, home networks, client sites, and public spaces. Contractors and third-party partners regularly require temporary access to internal systems. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> Sensitive data moves continuously between collaboration platforms, cloud storage, and web-based applications. </div>
<div style="text-align:left;"><br></div><p></p><p style="text-align:left;">The perimeter has not expanded — it has dissolved.</p></div>
<p></p></div></div><div data-element-id="elm_F8YSRuB85wJwkZYOuUdGwA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_F8YSRuB85wJwkZYOuUdGwA"] h2.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; } [data-element-id="elm_F8YSRuB85wJwkZYOuUdGwA"].zpelem-heading { margin-block-start:45px; } [data-element-id="elm_F8YSRuB85wJwkZYOuUdGwA"] .zpheading:after,[data-element-id="elm_F8YSRuB85wJwkZYOuUdGwA"] .zpheading:before{ background-color:#000000 !important; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:40px;font-weight:500;">Hybrid Work Has Redefined the Attack Surface</span></h2></div>
<div data-element-id="elm_qyGr6dPUbU-y0gHcWsygbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qyGr6dPUbU-y0gHcWsygbA"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_qyGr6dPUbU-y0gHcWsygbA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"> South African organisations have embraced hybrid work to improve flexibility and productivity. However, this shift has fundamentally changed how security risk must be managed. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> Applications exposed to the internet are prime targets for attackers. Remote users operate outside the protection of traditional network firewalls, while business-critical applications increasingly run as SaaS services. </div>
<div style="text-align:left;"><br></div><p></p><p></p><div style="text-align:left;"> Workers, data, and applications now exist everywhere. </div>
<div style="text-align:left;"><br></div><p></p></div><p></p></div></div><div data-element-id="elm_KOr0VV8eS2DBgvzhKpEgzA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KOr0VV8eS2DBgvzhKpEgzA"] h3.zpheading{ font-family:'Montserrat',sans-serif; font-size:37px; font-weight:500; } </style><h3 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:35px;font-weight:500;color:rgb(0, 0, 0);">Several modern risk factors are accelerating this challenge:</span><span style="font-size:32px;"></span></h3></div>
<div data-element-id="elm_jGPMaLCLSIajLEnISOZY6A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jGPMaLCLSIajLEnISOZY6A"] h3.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:28px; font-weight:400; } [data-element-id="elm_jGPMaLCLSIajLEnISOZY6A"] .zpheading:after,[data-element-id="elm_jGPMaLCLSIajLEnISOZY6A"] .zpheading:before{ background-color:#000000 !important; } </style><h3 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:32px;"><span>Shadow IT Growth</span></span></h3></div>
<div data-element-id="elm_QAVx9f0inJxWFHkHajdv_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QAVx9f0inJxWFHkHajdv_Q"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_QAVx9f0inJxWFHkHajdv_Q"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span>Employees frequently adopt unsanctioned SaaS tools or collaboration platforms without IT oversight.</span></p></div>
</div><div data-element-id="elm_SSO6IB1bqZfzxyqTig1ytA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SSO6IB1bqZfzxyqTig1ytA"] h3.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:28px; font-weight:400; } [data-element-id="elm_SSO6IB1bqZfzxyqTig1ytA"] .zpheading:after,[data-element-id="elm_SSO6IB1bqZfzxyqTig1ytA"] .zpheading:before{ background-color:#000000 !important; } </style><h3 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:30px;">Generative AI Adoption</span></h3></div>
<div data-element-id="elm_WLCh_Q0HGuFdo3gYMFkmdQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WLCh_Q0HGuFdo3gYMFkmdQ"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_WLCh_Q0HGuFdo3gYMFkmdQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span>AI tools improve productivity but can expose sensitive corporate information if governance controls are missing</span></p></div>
</div><div data-element-id="elm_zVb0AgbUWykLndRWgF1-0g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zVb0AgbUWykLndRWgF1-0g"] h3.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:28px; font-weight:400; } [data-element-id="elm_zVb0AgbUWykLndRWgF1-0g"] .zpheading:after,[data-element-id="elm_zVb0AgbUWykLndRWgF1-0g"] .zpheading:before{ background-color:#000000 !important; } </style><h3 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:30px;">Contractor and Partner Access</span></h3></div>
<div data-element-id="elm_FyPSMzBqi1Oqk68voQ7Img" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FyPSMzBqi1Oqk68voQ7Img"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_FyPSMzBqi1Oqk68voQ7Img"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span><span>Consultants, merger teams, and third-party vendors often require temporary access to internal applications.</span></span></p></div>
</div><div data-element-id="elm_NirnIqKilFjUR32gTmwOBw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NirnIqKilFjUR32gTmwOBw"] h3.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:28px; font-weight:400; } [data-element-id="elm_NirnIqKilFjUR32gTmwOBw"] .zpheading:after,[data-element-id="elm_NirnIqKilFjUR32gTmwOBw"] .zpheading:before{ background-color:#000000 !important; } </style><h3 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:30px;">Regulatory Pressure (POPIA)</span></h3></div>
<div data-element-id="elm_vlqAUM6SvDME9vFAgUItoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vlqAUM6SvDME9vFAgUItoQ"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_vlqAUM6SvDME9vFAgUItoQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span><span><span>South African organisations must ensure personal and sensitive data remains protected wherever it is accessed or processed.</span></span></span></p></div>
</div><div data-element-id="elm_RDFRKovFzqu15AyYcNepxw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_RDFRKovFzqu15AyYcNepxw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_RDFRKovFzqu15AyYcNepxw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_wHdcpdIvnx9_KbwgK9ujwA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wHdcpdIvnx9_KbwgK9ujwA"] h2.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; } [data-element-id="elm_wHdcpdIvnx9_KbwgK9ujwA"] .zpheading:after,[data-element-id="elm_wHdcpdIvnx9_KbwgK9ujwA"] .zpheading:before{ background-color:#000000 !important; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:40px;font-weight:500;">The Security Complexity Trap</span></h2></div>
<div data-element-id="elm_xAyIRuKtVZVdCcnCda7Rxg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xAyIRuKtVZVdCcnCda7Rxg"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_xAyIRuKtVZVdCcnCda7Rxg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"></div>
<p></p><div><p style="text-align:left;">Many organisations attempt to solve these challenges by adding additional security layers:</p><ul><li><p style="text-align:left;">Zero Trust Network Access (ZTNA)</p></li><li><p style="text-align:left;">Secure Web Gateways (SWG)</p></li><li><p style="text-align:left;">SaaS security tools (CASB)</p></li><li><p style="text-align:left;">DNS filtering and endpoint controls</p></li></ul><div style="text-align:left;"><br></div>
<p style="text-align:left;">While each technology solves a specific problem, combining multiple tools often creates operational complexity.<br><br></p><p style="text-align:left;">Multiple agents, multiple consoles, increased cost, and inconsistent policy enforcement can create new risks rather than reducing them.<br><br></p><p style="text-align:left;">Traditional cloud-delivered security models also introduce performance issues, requiring traffic backhauling and encrypted traffic inspection.<br><br></p><p style="text-align:left;">As complexity grows, visibility often decreases.</p></div>
<p style="text-align:left;"></p></div><p></p></div></div><div data-element-id="elm_98xjtFpfwHMC91eX3Ilkuw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_98xjtFpfwHMC91eX3Ilkuw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_98xjtFpfwHMC91eX3Ilkuw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_Kq1gUJXkUwkFahTBdlyNuQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:40px;font-weight:500;">The Browser Has Become the Workspace</span></h2></div>
<div data-element-id="elm_w9ak-angCckWtwyorUrXJw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_w9ak-angCckWtwyorUrXJw"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_w9ak-angCckWtwyorUrXJw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"></div>
<p></p><div><p style="text-align:left;"></p><div><p style="text-align:left;">When we observe how work happens today, one thing becomes clear. Most business activity happens inside the browser.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Employees use browsers to:</p><ul><li><p style="text-align:left;">Access SaaS applications</p></li><li><p style="text-align:left;">Collaborate through cloud platforms</p></li><li><p style="text-align:left;">Conduct research</p></li><li><p style="text-align:left;">Interact with AI tools</p></li><li><p style="text-align:left;">Access internal systems</p></li></ul><div style="text-align:left;"><br></div>
<p style="text-align:left;">The browser is no longer simply a tool. It is the workspace. This presents an opportunity to rethink security architecture.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Instead of routing traffic through multiple security layers, organisations can embed protection directly into the workspace itself.<br><br></p><p style="text-align:left;">A browser-centric security approach integrates secure access, web protection, SaaS controls, DNS filtering, and data protection into a single workspace environment. <br><br> This allows consistent policies to follow users everywhere.</p></div>
<p style="text-align:left;"></p></div><p style="text-align:left;"></p></div><p></p></div>
</div><div data-element-id="elm_3LHH3vKC8n8g2I61Kn8WaQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_3LHH3vKC8n8g2I61Kn8WaQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_3LHH3vKC8n8g2I61Kn8WaQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_oVCaG8Vv_klUgQjQFauKOw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oVCaG8Vv_klUgQjQFauKOw"] h2.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; } [data-element-id="elm_oVCaG8Vv_klUgQjQFauKOw"] .zpheading:after,[data-element-id="elm_oVCaG8Vv_klUgQjQFauKOw"] .zpheading:before{ background-color:#000000 !important; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:40px;"><span><span><span>Securing the Modern Workspace</span></span></span></span></h2></div>
<div data-element-id="elm_oxIF9KHm4LNHci9QZX0kJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oxIF9KHm4LNHci9QZX0kJg"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_oxIF9KHm4LNHci9QZX0kJg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"></div>
<p></p><div><p style="text-align:left;"></p><div><p style="text-align:left;"></p><div><p style="text-align:left;">Moving security closer to user activity provides several advantages:</p><ul><li><p style="text-align:left;">Reduced infrastructure complexity</p></li><li><p style="text-align:left;">Consistent security policies everywhere</p></li><li><p style="text-align:left;">Better visibility into SaaS and AI usage</p></li><li><p style="text-align:left;">Stronger control of sensitive data</p></li><li><p style="text-align:left;">Secure access for contractors and third parties</p></li></ul><div style="text-align:left;"><br></div>
<p style="text-align:left;">This model also supports compliance requirements such as POPIA, ensuring sensitive information is protected regardless of where employees work.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Most importantly, it aligns security with how work actually happens.</p></div>
<p style="text-align:left;"></p></div><p style="text-align:left;"></p></div><p style="text-align:left;"></p></div>
<p></p></div></div><div data-element-id="elm_-oTUJCXLc2EnGeyctrPzrA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_-oTUJCXLc2EnGeyctrPzrA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_-oTUJCXLc2EnGeyctrPzrA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_dmIBdwoxts0jf9ySYwArjQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dmIBdwoxts0jf9ySYwArjQ"] h2.zpheading{ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; } [data-element-id="elm_dmIBdwoxts0jf9ySYwArjQ"] .zpheading:after,[data-element-id="elm_dmIBdwoxts0jf9ySYwArjQ"] .zpheading:before{ background-color:#000000 !important; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:40px;"><span><span><span><span>Why This Matters Now</span></span></span></span></span></h2></div>
<div data-element-id="elm_ZGO65Pz5aZrysgaJV0yEFQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZGO65Pz5aZrysgaJV0yEFQ"].zpelem-text { color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } [data-element-id="elm_ZGO65Pz5aZrysgaJV0yEFQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#000000 ; font-family:'Montserrat',sans-serif; font-size:18px; font-weight:400; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"></p><div><p></p><div style="text-align:left;"></div>
<p></p><div><p style="text-align:left;"></p><div><p style="text-align:left;"></p><div><p style="text-align:left;"></p><div><p style="text-align:left;">South African organisations face increasing pressure from regulators, boards, and customers to demonstrate strong governance and resilience.<br><br></p><p style="text-align:left;">At the same time, IT teams must support hybrid work, enable digital transformation, and manage cybersecurity costs.</p><p style="text-align:left;">Simply adding more security tools is rarely sustainable.<br><br></p><p style="text-align:left;">A smarter strategy is to simplify security architecture and secure the workspace itself.<br><br></p><p style="text-align:left;">Organisations that continue investing primarily in perimeter-based security will see diminishing returns.<br><br></p><p style="text-align:left;">The future belongs to organisations that secure the workspace.</p></div>
<p style="text-align:left;"></p></div><p style="text-align:left;"></p></div><p style="text-align:left;"></p></div>
<p style="text-align:left;"></p></div><p></p></div></div><div data-element-id="elm_b6i0DFGfQwiHwGDFaywAnA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_b6i0DFGfQwiHwGDFaywAnA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_b6i0DFGfQwiHwGDFaywAnA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_yKQ3oLa8bj25qA7PwO3JxA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yKQ3oLa8bj25qA7PwO3JxA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_yKQ3oLa8bj25qA7PwO3JxA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 30 Mar 2026 09:46:39 +0000</pubDate></item><item><title><![CDATA[Why Identity Has Become the New Cybersecurity Battleground]]></title><link>https://www.cyberinsight.co.za/blogs/post/why-identity-has-become-the-new-cybersecurity-battleground</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cyberinsight.co.za/Blogs/Blog Images -2-.png"/>Identity is the new cybersecurity battleground. Discover how Sophos ITDR helps businesses detect misconfigurations, stop stolen credentials, and protect digital identities.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qjT-e8YoQc25pjaXxnt1Tw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3vPCFc_uT4uASH90vnQVBg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YqOj1KuYQs6vURchSm0EcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MkNYrZw2-FPak9S6joTM_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_MkNYrZw2-FPak9S6joTM_g"] .zpimage-container figure img { width: 1240px ; height: 734.81px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.cyberinsight.co.za/Blogs/Blog%20Images%20-2-.png" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw"] div.zpspacer { height:9px; } @media (max-width: 768px) { div[data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw"] div.zpspacer { height:calc(9px / 3); } } </style><div class="zpspacer " data-height="9"></div>
</div><div data-element-id="elm_-1ikVoKHRjqbnT_yjV6kmg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-1ikVoKHRjqbnT_yjV6kmg"] h2.zpheading{ font-family:'Montserrat',sans-serif; font-weight:600; line-height:50px; } </style><h2 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>How identity-based threats are reshaping cybersecurity and why proactive detection is now essential for every organisation.</span></h2></div>
<div data-element-id="elm_diAXqA_NQ024AgrHfinc-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_diAXqA_NQ024AgrHfinc-w"].zpelem-text { color:#013A51 ; font-size:20px; margin-block-start:38px; } [data-element-id="elm_diAXqA_NQ024AgrHfinc-w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p>For years, cybersecurity has focused on keeping the “bad guys” out — firewalls, antivirus tools, and endpoint protection have long been the backbone of defence.<br> But today, the real front line isn’t at the perimeter anymore. It’s inside your organisation, hidden within the very <strong>identities</strong> that control access to your systems, data, and applications. Identity has become the new battleground.</p><p></p></div>
</div><div data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg"] div.zpspacer { height:17px; } @media (max-width: 768px) { div[data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg"] div.zpspacer { height:calc(17px / 3); } } </style><div class="zpspacer " data-height="17"></div>
</div><div data-element-id="elm_LhZ8LbLre3OqhimYRVzRcA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>The Shift from Perimeter to Identity</strong></span></span></h3></div>
<div data-element-id="elm_BtQ6AG588gVHATp0-rw-ew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BtQ6AG588gVHATp0-rw-ew"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_BtQ6AG588gVHATp0-rw-ew"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p>As businesses move to hybrid and cloud environments, attackers have adapted. Instead of trying to break through network defences, they’re using <strong>stolen credentials</strong>, <strong>misconfigurations</strong>, and <strong>weak access controls</strong> to log in as legitimate users.</p><p>It’s a simple, effective, and frighteningly common tactic.</p></span></span><p></p><p></p></div>
</div><div data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p>According to recent Sophos research,<br><span><span></span></span></p><ul><li><strong>90% of organisations</strong> experienced at least one identity-related breach in the past year.</li><li><strong>95% of Microsoft Entra ID environments</strong> (formerly Azure AD) have at least one critical misconfiguration that could allow privilege escalation.</li></ul></span></span><span><span>These aren’t just statistics — they represent a fundamental change in how cyber risk operates.</span></span><br><p></p><p></p><p></p></div>
</div><div data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div><div data-element-id="elm_OnWKqrm6WsfuydleDpzyBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Introducing Sophos Identity Threat Detection and Response (ITDR)</strong></span></span></h3></div>
<div data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p>At Cyber Insight, we’ve seen this trend accelerating across South Africa’s business landscape. That’s why we’re proud to integrate <strong><a href="https://www.sophos.com/en-us/products/identity-threat-detection-and-response?partner_referral_id=0013Z00001mQdpr&amp;partner_name=CYBER%2BINSIGHT%2B%28PTY%29%2BLTD%3Fpartner_referral_id=0013Z00001mQdpr&amp;partner_name=CYBER%2BINSIGHT%2B%28PTY%29%2BLTD" title="Sophos Identity Threat Detection and Response (ITDR)" rel="">Sophos Identity Threat Detection and Response (ITDR)</a></strong> into our managed security portfolio.</p><p>ITDR is a next-generation capability that continuously monitors your environment for <strong>identity risks, misconfigurations, and stolen credentials</strong>. It combines visibility with action — enabling organisations to detect anomalies, respond automatically, and benchmark their identity security posture over time.</p></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p>In practical terms, that means:</p><ul><li><strong>Continuous scanning</strong> of Microsoft Entra ID to detect security gaps and over-privileged accounts.</li><li><strong>Dark web intelligence</strong> to alert you if employee credentials are being traded or leaked.</li><li><strong>Automated responses</strong>, such as account locking, password resets, and session termination.</li><li><strong>Risk scoring and trend analysis</strong> to track improvement and compliance with frameworks like CIS and NIST.</li></ul></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_AfKmcGfC016YqHyaNvikyQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_AfKmcGfC016YqHyaNvikyQ"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_AfKmcGfC016YqHyaNvikyQ"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div><div data-element-id="elm_Fz-v6TL2CtyU66JHc1bKQA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span style="font-weight:500;"><strong>Why This Matters for South African Businesses</strong></span></strong><strong></strong><span><span><strong></strong></span></span></h3></div>
<div data-element-id="elm_XfImlG9vmgadLttYIXyZ4w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XfImlG9vmgadLttYIXyZ4w"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_XfImlG9vmgadLttYIXyZ4w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span>Identity-based attacks are on the rise in South Africa, particularly among <strong>financial institutions, professional services firms, and mid-sized enterprises</strong>.<br> Cybercriminals know that once they compromise a legitimate account, they can quietly move through systems undetected — often for weeks or months — before deploying ransomware or stealing data.</span></span></span></span><br><p></p><p></p><p></p></div>
</div><div data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p>Unfortunately, many organisations still treat identity protection as a “check-box” exercise rather than a continuous, proactive discipline. This is the gap that <strong>ITDR closes</strong>.<br><br></p><p>By combining <strong>automated identity posture assessment</strong> with <strong>human-led response</strong> from Cyber Insight’s SOC analysts, we help businesses stay ahead of attacks that traditional tools often miss.</p></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p>“Cybersecurity is no longer just about malware and firewalls — it’s about securing the people and credentials that power your business,” says <strong>Deon Smal, CEO of Cyber Insight</strong>.<br> “With Sophos ITDR, we can detect identity threats before they escalate and give our clients the visibility to take decisive action.”</p></blockquote></span></span></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_zaOLInYPnTRDjLgipG1BFw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_zaOLInYPnTRDjLgipG1BFw"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_zaOLInYPnTRDjLgipG1BFw"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div><div data-element-id="elm__UqHjTdDgkGnmNEM_Ij5Ew" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>A Smarter Way Forward</strong></span></span></h3></div>
<div data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span>Identity security is not a technology problem — it’s a visibility problem. You can’t defend what you can’t see.</span></span></p></blockquote></span></span></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p>Sophos ITDR gives South African organisations that missing layer of visibility and control. It transforms identity data into actionable insight, empowering teams to:</p><ul><li>Understand where risk lives in their environment.</li><li>Benchmark improvements over time.</li><li>Respond automatically when suspicious behaviour is detected.<br><br></li></ul><p>By integrating ITDR into our managed detection and response service, <strong>Cyber Insight delivers a unified approach to security</strong> — one that connects identity, endpoint, and network telemetry into a single, intelligent defence model.</p></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng"] div.zpspacer { height:21px; } @media (max-width: 768px) { div[data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng"] div.zpspacer { height:calc(21px / 3); } } </style><div class="zpspacer " data-height="21"></div>
</div><div data-element-id="elm_P8hrpm_Nvj4af5NxTq1W_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Local Experts. Global Intelligence. Trusted Protection.</strong></span></span></h3></div>
<div data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p></p><span><span><p>At Cyber Insight, our mission is simple: to help organisations build <strong>resilience through clarity</strong>.<br><br></p><p>We combine world-class technology from partners like <strong>Sophos</strong> with local expertise to ensure that South African businesses — from SMEs to large enterprises — can operate confidently in a rapidly changing threat landscape.</p><p><br> Because in cybersecurity, visibility is power. And with Sophos ITDR, that visibility starts with identity.</p></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div><div data-element-id="elm_d0eRBb9HqDYIOKRpgW2w_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Want to learn more?</strong></span></span></h3></div>
<div data-element-id="elm_JQiSmLHMluNFwplu3G0dcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JQiSmLHMluNFwplu3G0dcg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_JQiSmLHMluNFwplu3G0dcg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p></p><span><span><p></p><span><span>Contact us at <strong>info@cyberinsight.co.za</strong> to schedule a consultation.</span></span></span></span></span></span><br><p></p><p></p><p></p></div>
</div><div data-element-id="elm_XMOIf63mSHCl3oi6GCh5TA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:info@cyberinsight.co.za"><span class="zpbutton-content">Contact us</span></a></div>
</div><div data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 21 Nov 2025 12:34:57 +0000</pubDate></item><item><title><![CDATA[The key roles of honeypots, tarpits and black holes in cybersecurity]]></title><link>https://www.cyberinsight.co.za/blogs/post/the-key-roles-of-honeypots-tarpits-and-black-holes-in-cybersecurity1</link><description><![CDATA[In the cybersecurity world honeypots represent traps designed solely to lure cybercriminals away from the real targets – sensitive corporate data repo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7zQwtA9vRtqK8QpkiF985w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z0k-Iy7zTrqyLFeDH8ujcQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_T0BXRJMHQ4-JiRumsQHA0w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_oFLeFfEpRoyBKcdRAGl_ww" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oFLeFfEpRoyBKcdRAGl_ww"] h2.zpheading{ line-height:50px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><b><span>The key roles of honeypots, tarpits and black holes in cybersecurity</span></b></span></h2></div>
<div data-element-id="elm_slxONkW0S6Wqt71sjC4OAQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div> In the cybersecurity world honeypots represent traps designed solely to lure cybercriminals away from the real targets – sensitive corporate data repositories and vulnerable systems and applications. </div>
<br><div> Honeypots appear to those with malintent as actual computer systems carrying data and applications. However, they dupe hackers into believing they have identified an authentic target such as a corporate accounting or HR system.&nbsp; </div>
<br><div> Of course, once the hackers have breached the honeypot’s bogus defences, their activities can be tracked and their techniques and methods analysed. This data represents extremely valuable intelligence that can be used to strengthen the bulwarks of the corporate network.&nbsp; </div>
<br><div> By design, a honeypot will not attract any legitimate data traffic, so all activities logged are more than likely to be probes or intrusion attempts by cybercriminals. </div>
<br><div> Did you know that the term “honeypot” comes from the world of espionage? It refers to the romantic relationships cultivated by Mata Hari-type spies who use their feminine wiles to steal secrets from the enemy. </div>
<br><div> How is an effective honeypot established?&nbsp; </div><br><div> The plan is to incorporate intentional security vulnerabilities or materials that would make the honeypot attractive to an attacker. For instance, the honeypot may be associated with weak, easy-to-decipher passwords, or it may have exposed, open ports. </div>
<br><div> Honeypots also play an important role in penetration testing, supplying information in the form of forensic evidence that can be used to map existing threats and identify new threats. These may emanate from trusted insiders or external miscreants. </div>
<br><div> For organisations that view honeypots as valuable armour, there are a number of options from which to choose. The selection, which should be based on perceived vulnerabilities, is not limited in scope. In other words, choose as many as you believe will be necessary given your circumstances. </div>
<br><div> Probably one of the most common honeypots is the email or spam trap. This honeypot tricks hackers into searching for a fake email address in a hidden location where only an automated address harvester will find it. All messages containing similar content to those sent to the trap can be automatically blocked and the senders’ IP addresses added to a deny-list. </div>
<br><div> Another honeypot variant is the decoy database which is designed to monitor software vulnerabilities and identify attackers who take advantage of insecure system architectures or use techniques such as privilege abuse, SQL injection or SQL services exploitation. </div>
<br><div> “Spiders” in cybersecurity terms are web crawlers in the form of programs and automated script that browse the Internet in a methodical, automated manner searching for targets. A spider honeypot is therefore intended to trap web crawlers by creating web pages and links only accessible to crawlers. Detecting these spiders is central to blocking malicious bots and ad-network crawlers. </div>
<br><div> In addition to individual honeypots, there are complementary techniques and processes designed to frustrate the activities of hackers such as honeynets which expand the honeypot concept by incorporating a series of networked honeypots.&nbsp; </div>
<br><div> Then there are “tarpits” or mechanisms designed to slow the progress of hackers by purposefully delaying network connections, thereby presenting less-attractive targets. </div>
<br><div> “Black holes” also play a role in cybersecurity. They are defined as invisible places on the network where incoming or outgoing data traffic is silently discarded without the source – the hacker – being aware that the data did not reach its intended recipient. </div>
<br><div> Let me end with a word of warning: While a honeypot will most likely trick attackers into believing they've gained access to a real system, should the hackers realise the deception, they could create spoof attacks to distract attention from their real intentions or feed fake information to the honeypot for analysis. </div>
<br><div> This why honeypots should always be professionally configured and never be considered as permanent replacements for proven security systems and controls.&nbsp; </div>
<br><div><br></div></div><p></p></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 21 Nov 2025 11:50:27 +0000</pubDate></item><item><title><![CDATA[Significant security benefits from a 2FA and password management partnership]]></title><link>https://www.cyberinsight.co.za/blogs/post/significant-security-benefits-from-a-2fa-and-password-management-partnership1</link><description><![CDATA[Password management should be seen as essential and must apply to every employee. When teamed with 2FA, effective password management enables employees to safely share credentials while maintaining excellent standards in terms of password hygiene.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JQWbH4FOSBuRAFtrppKAZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VH9cEEmBR02OjhhCt95JEA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dfCWIj-qRyqtbQhQ2-tuSQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Dq3UjcrPSbyMk07kPB2F8w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Dq3UjcrPSbyMk07kPB2F8w"] h2.zpheading{ line-height:50px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><b><span>Significant security benefits from a 2FA and password management partnership</span></b></span></h2></div>
<div data-element-id="elm_SMLBmUjMQ7yyGELOTLQQgg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p><span>We are being encouraged to adopt two-factor authentication (2FA), the process of adding an additional layer of security when accessing accounts and services online. It requires an additional login credential – beyond just the usual username and password – to gain account access. Getting that second credential requires a second device; your cell phone, for example.<br><br></span></p><p><span>With 2FA, your on-line transaction and your account are protected by both your password and your phone which is used to verify your actions, usually by a one-time pin (OTP) code which is sent via text, voice call or mobile app.<br><br></span></p><p><span>Many millions of users around the globe now use 2FA to guard against the activities of hackers and cybercriminals. <br><br></span></p><p><span>In the US, the National Cyber Security Centre (NCSC) recommends 2FA for “high value” and email accounts. It is increasingly obvious, notes the NCSC, that email provides a vulnerable ingress route for cybercriminals to reset passwords on other accounts.<br><br></span></p><p><span>In the UK, the finance sector has acknowledged the increasing propensity for cyberattacks linked to online transactions and has worked with regulators to introduce what they call strong customer authentication (SCA) in this high-risk sector. <br><br></span></p><p><span>Verison’s 2021 Data Breach Report emphasises that “strong authentication is necessary as passwords alone provide weak protection because they can be guessed and phished and, once stolen, tried against a range of accounts in the hope of securing a hit”.<br><br></span></p><p><span>There are industry watchers who believe the adoption of 2FA is an important step towards a truly password-less future. They say that password authentication is plagued by problems resulting in poor user experiences - mainly because passwords are easily compromised.<br><br></span></p><p><span>However, as true as this might be, rest assured the market is some way off the ubiquitous adoption of password-less authentication. Why? The short answer is it isn’t easily achievable. There are challenges which include today’s complex and hybrid IT environments, compliance standards and regulations that must be addressed, not to mention the costs associated with administering and managing a password-less environment.<br><br></span></p><p><span>The immediate solution lies in the adoption of an effective password management solution which, when operated in tandem with 2FA, is an excellent way to secure access to accounts and services online. A password management solution is able to creates strong, unique passwords that will stand up to a battery of tests.<br><br></span></p><p><span>Marrying 2FA and password management takes cyber security to the next level. It permits full control over an organisation’s credentials – who is using them and when. This is because access to passwords is now permission-based. <br><br></span></p><p><span>Significantly, password management systems and 2FA secure your data because even by knowing your master password (under which all individual passwords are amassed), nobody (including hackers) will be able to access your account. <br><br></span></p><p><span>This is known as the "zero knowledge" technique, designed to keep data safe even if the company is hacked. It’s a technique that makes the task of breaching security far less appealing to those with malintent.<br><br></span></p><p><span>The combination of 2FA and password management is particularly important for secure network onboarding. This is when a new employee or guest user – often with multiple devices – has to gain access to the corporate network for the first time. Security concerns are always heightened then.<br><br></span></p><p><span>Security is also critical during the offboarding process, following the resignation, termination or retirement of an employee who subsequently leaves the company. <br><br></span></p><p><span>It is accepted that current and former employees – with or without malicious intentions – are often responsible for putting businesses at risk due to their actions. In fact, research indicates that employees – past and present – are responsible for around 80% of serious security breaches. In most cases best operating practices were not enforced.<br><br></span></p><p><span>Looking ahead, password management should be seen as essential and must apply to every employee, from the first day of onboarding, through to the last day before retirement. When teamed with 2FA, effective password management enables employees to safely share credentials while maintaining excellent standards in terms of password hygiene.</span></p></div>
<p></p></div></div><div data-element-id="elm_AmA8opD2T_a__j_HraFlvw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 21 Nov 2025 11:48:07 +0000</pubDate></item><item><title><![CDATA[Disturbing victor in 2022 business risk survey]]></title><link>https://www.cyberinsight.co.za/blogs/post/disturbing-victor-in-2022-business-risk-survey</link><description><![CDATA[It was expected that the effects of the Covid-19 pandemic and surges in Delta and Omicron infections would have resulted in Business Interruption (BI) ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xxe1PnkVRwWG4G0T2dLq7w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2hqlMKwORuOFvKiy_6k-bw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_UvIliMI8RGKnAUGR4FJE4g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Rj-UrlUWR-2ldga6d2__Qg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><b><span>Disturbing victor in 2022 business risk survey</span></b></span></h2></div>
<div data-element-id="elm_VQT7dhg7TMm2MnHnIJ8mNw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div> It was expected that the effects of the Covid-19 pandemic and surges in Delta and Omicron infections would have resulted in Business Interruption (BI) maintaining its top spot in the 2022 rankings of the acclaimed Allianz Risk Barometer survey. </div>
<br><div> The annual Allianz survey and subsequent report identifies the top corporate risks expected for the next 12 months and beyond, based on the insight of more than 2,650 risk management experts from 89 countries and territories. </div>
<br><div> In the past, BI has scored well, as it is synonymous with many of the top ranked risks faced by businesses around the globe. </div>
<br><div> However, this year expectations that BI would once again feature at the top of the list of the most serious risks to business were wide of the mark. </div>
<br><div> For only the third time in the 11-year history of the Allianz Risk Barometer, BI has dropped to second place. </div>
<br><div> What tops the Risk Barometer charts this year? It’s the risk from Cyber Incidents. </div>
<br><div> Significantly, according to Allianz, the threat of Cyber Incidents ranks as a top three peril in most countries surveyed and “cyber perils” are the biggest concern for companies globally in 2022 as ransomware and other disruptive forms of cyberattacks continue unabated. </div>
<div><br></div><div> According to companies surveyed, the threat of ransomware attacks, data breaches or major IT outages concern companies even more than business and supply chain disruption, natural disasters or the Covid-19 pandemic, all of which have heavily affected firms in the past year. </div>
<div><br></div><div> In its report on the Risk Barometer, Allianz highlighted the surge in ransomware attacks as the top cyber threat facing organisations in 2022.&nbsp; </div>
<br><div> It noted that recent attacks have shown worrying trends such as “double extortion” tactics combining the encryption of systems with data breaches; exploiting software vulnerabilities (for example, the Log4J and Kaseya attacks) or targeting physical critical infrastructure. </div>
<br><div> The report underlines the role of cyber security which it says ranks as companies’ major environmental social governance (ESG) concern with respondents acknowledging the need to “build resilience and plan for future outages or face the growing consequences from regulators, investors and other stakeholders”. </div>
<br><div> According to Scott Sayce, Head of Cyber at Allianz Global Corporate &amp; Specialty (AGCS) a key business unit of Allianz Group, ransomware has become “big business” for cyber criminals, who are refining their tactics, lowering the barriers to entry for as little as a $40 subscription.&nbsp; </div>
<br><div> “The commercialisation of cybercrime makes it easier to exploit vulnerabilities on a massive scale. We will see more attacks against technology supply chains and critical infrastructure,” he warns. </div>
<br><div> Here at Cyber Insight, we continue to advise South African businesses of the dangers they face from the main ransomware categories - Crypto, Locker, Double Extortion and Ransomware as a Service (RaaS). </div>
<br><div> We’ve explained how Crypto ransomware variants are mainly spread via email while the Locker alternative takes the distinctive route of locking its victims out of their devices.&nbsp; </div>
<br><div> We’ve described how Double Extortion ransomware is able to launch devastating, multistage attacks on target organisations, while RaaS, “the business for criminals, by criminals” provides ransomware to affiliates on a monthly fee basis. </div>
<br><div> Is there a counter to the ransomware scourge? Cyber Insight’s recently-launched plan for Secure Future Protection provides insight into processes and policies designed to assist with the implementation of solutions aimed at constantly improving cyber resilience. </div>
<br><div> One of the keys to the plan for Secure Future Protection is the professional implementation of a stringent, secure email gateway designed to prohibit malware and spam as well as bad URL/IP addresses from entering users’ mailboxes. The plan includes personalised support to guide you through the implementation and optimisation phases of email security. </div>
</div><p></p></div></div><div data-element-id="elm_E9GaBphRT5S1cDG6yx61MA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Thu, 20 Nov 2025 11:57:37 +0000</pubDate></item><item><title><![CDATA[Integrated Leadership: The Missing Link in Cyber Resilience]]></title><link>https://www.cyberinsight.co.za/blogs/post/integrated-leadership-the-missing-link-in-cyber-resilience</link><description><![CDATA[Cybersecurity is no longer just a technical issue — it’s a business resilience challenge. Burnout, fragmented ownership, and board disengagement are creating hidden vulnerabilities that leave organisations exposed.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_GcxfT8juR_2ABGJy4qVXbQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ikKUkr2OTCKqWvvEnnsVpw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_GXS7CnT-QT6JVas9dKNSJg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_PQK3zAdosFY0JTomSEDJyg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_PQK3zAdosFY0JTomSEDJyg"] .zpimage-container figure img { width: 1240px ; height: 734.81px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.cyberinsight.co.za/Blogs/Blog%20Images%20-1-.png" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_l5aXLGHCS8uABtsxAqNjQQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_l5aXLGHCS8uABtsxAqNjQQ"] h2.zpheading{ font-family:'Montserrat',sans-serif; font-size:48px; font-weight:500; line-height:50px; } [data-element-id="elm_l5aXLGHCS8uABtsxAqNjQQ"].zpelem-heading { margin-block-start:38px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Treating cybersecurity as a business asset, not just a technical function, is the key to sustainable resilience.</span></h2></div>
<div data-element-id="elm_cVkKfNt1f8VsZfhSmNQBbQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cVkKfNt1f8VsZfhSmNQBbQ"] div.zpspacer { height:37px; } @media (max-width: 768px) { div[data-element-id="elm_cVkKfNt1f8VsZfhSmNQBbQ"] div.zpspacer { height:calc(37px / 3); } } </style><div class="zpspacer " data-height="37"></div>
</div><div data-element-id="elm_sHDBCctlRhaYbGNuxbpJPg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span>In too many boardrooms, cybersecurity is still seen as a technical matter — a job for IT teams to manage quietly in the background. Firewalls, antivirus, SOC dashboards: tick the boxes and move on. But in today’s world of AI-driven attacks, ransomware campaigns, and regulatory pressure, this view is dangerously outdated. Cybersecurity is not just a technical issue — it is a business resilience issue.</span></p></div>
</div><div data-element-id="elm_OTeraUFSJxdPqbX2EEafvQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>Fragmented Ownership Weakens Resilience</span></b></span></h3></div>
<div data-element-id="elm_lKN4Il7JQHGvCN0D0awIKg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;"><span>When ownership of cybersecurity is fragmented — with IT fighting threats in isolation while leadership assumes everything is “covered” — resilience breaks down. Attackers move faster, more creatively, and at greater scale than ever before. Without integrated leadership, organisations end up reacting to crises instead of preventing them.</span></p></div>
<p></p></div></div><div data-element-id="elm_T0kZ_iBPixout5ixtbkwBA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_T0kZ_iBPixout5ixtbkwBA"] h3.zpheading{ font-family:'Montserrat',sans-serif; font-weight:700; } </style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;">Burnout Is a Systemic Risk</span><b></b><b></b><span><b><span></span></b></span></h3></div>
<div data-element-id="elm_OZkByaBPtUWZkUXCEbimhw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;"><span>Cybersecurity teams face relentless pressure: rising volumes of alerts, a global talent shortage, and the impossible expectation of delivering 100% protection. Burnout is not just an HR concern. Exhausted teams miss threats, make mistakes, or leave — creating blind spots just when attackers are looking for them. Resilience depends on supporting the people who defend it.</span></p></div>
<p></p></div></div><div data-element-id="elm_x--G-OZl9A10RWWkdK4Jcg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span><span>Boards Must Engage</span></span></b></span></h3></div>
<div data-element-id="elm_oNqstSiIlN2hIl-sCfQ81Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span>True resilience requires cybersecurity to be discussed in the same breath as financial continuity, compliance, and reputation. Boards must demand clear reporting, ask the tough questions, and treat cybersecurity as a core business risk. Without this engagement, organisations risk underestimating exposure — until it is too late.</span></p></div>
</div><div data-element-id="elm_l7opWDBNmKEPMdIcJYj2RQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span><span>Cybersecurity as an Asset</span></span></b></span></h3></div>
<div data-element-id="elm_0aGR7Hdc3ugDzjeZbF4_Ww" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span>Cybersecurity should not be written off as a cost line. It is an investment that protects continuity, valuation, and customer trust. Just as companies insure their physical assets, they must strategically invest in digital defenses. Resilient organisations already understand that strong security is a competitive advantage, not just an obligation</span></p></div>
</div><div data-element-id="elm_8NrXKkUUJR2fjXuzEjKvJQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span><span><span>How Cyber Insight Helps</span></span></span></b></span></h3></div>
<div data-element-id="elm_rQJGTuKbfg2-jmhtLRYlCA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span><span>At Cyber Insight, we help organisations embed leadership into their cyber resilience strategies:</span></span></p></div>
</div><div data-element-id="elm_kcGIY6QG4Qt2xBfScQLLpw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span></span></p><div><ul><li><b><span>vCISO Services</span></b><span> → Bridge the gap between boards and technical teams with governance, reporting, and risk alignment.</span></li><li><b><span>Managed Services</span></b><span> → Reduce the operational burden with Managed Detection &amp; Response (MDR) and Managed Security Services (MSS).</span></li><li><b>Tailored Security Stacks</b> → Best-of-breed technologies aligned with growth and risk appetite.</li><li><b><span>Local SOC with Global Intelligence</span></b><span> → South African-based operations with global visibility, ensuring leadership has confidence and clarity.</span></li></ul></div>
<p></p></div></div><div data-element-id="elm_6xr8TsoeZd2Z4EaKft2GSQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span><span><span>Conclusion: Moving as One</span></span></span></b></span></h3></div>
<div data-element-id="elm_qxOChAY6b64WKEu03yFvkg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span></span></p><div><p><span>The most advanced firewall cannot fix a leadership blind spot. True cyber resilience requires leaders, teams, and technology to move as one. Organisations that integrate these elements will not only withstand today’s threats but also emerge stronger, trusted, and future-ready.</span></p></div>
<p></p></div></div><div data-element-id="elm_lwGhAMqkwSCl9oB78ckx9Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_lwGhAMqkwSCl9oB78ckx9Q"] div.zpspacer { height:16px; } @media (max-width: 768px) { div[data-element-id="elm_lwGhAMqkwSCl9oB78ckx9Q"] div.zpspacer { height:calc(16px / 3); } } </style><div class="zpspacer " data-height="16"></div>
</div><div data-element-id="elm_GZMJ9nAvGYhU65u0xTxPAg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;"><span></span></p><div><p><span style="font-weight:600;">At Cyber Insight, we do not just secure systems. We empower leadership to own resilience.</span></p></div>
<p></p></div></div><div data-element-id="elm_SO485S9gf0twHW3FaKM1Cw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_SO485S9gf0twHW3FaKM1Cw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_SO485S9gf0twHW3FaKM1Cw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 17 Sep 2025 14:17:40 +0000</pubDate></item><item><title><![CDATA[Your Company's secrets. Are they as secure as you believe them to be? ]]></title><link>https://www.cyberinsight.co.za/blogs/post/your-company-s-secrets.-are-they-as-secure-as-you-believe-them-to-be</link><description><![CDATA[How open-source intelligence (OSINT) gives cybercriminals the tools to uncover vulnerabilities, exploit employees, and launch devastating attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_MFrDj2aJQaCnmcBOm7IBmw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_A8cDA1v-Txe93nFJMKDhAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_9EHatBM5Q2-IlT8c7eb-Pg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bgdReEMlwwmWjfwVczrovg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_bgdReEMlwwmWjfwVczrovg"] .zpimage-container figure img { width: 1340px ; height: 794.07px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.cyberinsight.co.za/Blogs/Untitled%20design%20-9-.png" size="fit" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_J4jkZbTQTTanS20MLL4ZQw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>How open-source intelligence (OSINT) gives cybercriminals the tools to uncover vulnerabilities, exploit employees, and launch devastating attacks.</span></h2></div>
<div data-element-id="elm_DWc2hlCsQ2urLJCbYc5lxQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><br></p><div><div> Currently, almost every malicious cyberattack involves open-source intelligence or OSINT. This refers to the collection and analysis of data gathered from open or overt and publicly-available sources to produce actionable intelligence.&nbsp; </div>
<br><div> The concept of OSINT was initially used to address matters of national security. In the United States, for example, the process of gathering OSINT falls within the ambit of Department of Defence and the State Department. </div>
<br><div> OSINT is defined by political scientist Jeffrey Richelson as the process of “procuring verbal, written or electronically-transmitted material that can be obtained legally”. </div>
<br><div> The emphasis on the legal gathering of OSINT is obvious when studying the six categories of information flow that are formally identified as OSINT sources:&nbsp; </div>
<br><div> 1. Conventional media such as newspapers, magazines and radio/TV broadcasts. </div>
<br><div> 2. Online publications, blogs and discussion groups as well as YouTube, Facebook, Twitter, Instagram and other social media websites. </div>
<br><div> 3. Public government data contained in reports, budgets, hearings, telephone directories, press conferences, websites and speeches.&nbsp; </div>
<br><div> 4. Professional and academic publications as well as data acquired conferences, symposia, academic papers, dissertations and theses. </div>
<br><div> 5. Commercial data, including imagery, financial and industrial assessments and databases. </div>
<br><div> 6 Grey literature, including technical reports, working papers, unpublished works and newsletters. </div>
<br><div> When did OSINT gain its nefarious image? </div><br><div> OSINT is distinguished from research in that it applies the process of intelligence-gathering to “create tailored knowledge supportive of a specific decision by a specific individual or group”. </div>
<br><div> In recent times individual hackers and groups of cybercriminals have increasingly used OSINT to support targeted and often highly effective attacks on companies and individuals worldwide. The favoured weapons are phishing emails designed to establish a foundation for the launch of company-wide ransomware attacks.&nbsp; </div>
<br><div> While there are many intelligence-gathering tools and techniques used by cybercriminals, the preferred choice is Google. So much so, that “Google dorking” and “Google hacking” are part of the criminals’ lexicon. </div>
<br><div> Google hacking involves the use of cleverly-crafted queries to find or “mine” specific information that will seldom appear in a regular Google search. </div>
<br><div> According to YouTuber Craig Hays, adding in search operators such as “inurl” and “filetype” along with sensitive keywords such as “password”, “secret” or “confidential” can return interesting results. </div>
<br><div> In an online article, he lists two examples of his own work as a penetration tester. </div>
<br><div> “I’ve shown leaked password files both on Amazon’s S3 simple storage service and on a traditional website. Below that I’ve done a search on the code hosting site github.com for the phrases ‘BEGIN RSA PRVATE KEY’ and ‘AWS_SECRET’. The credentials you can see give you VPN access into someone’s corporate network and API access to someone’s Amazon web services account.” </div>
<br><div> He goes on to explain how he used Shodan, a search engine for Internet-connected devices, to find RDP (Remote Desktop Protocol) servers that are publicly accessible from the Internet.&nbsp; </div>
<br><div> “Once they [cybercriminals] get in they’ll have a foothold on a network to start poking around, elevating their level of access, stealing data and installing ransomware on anything they can see,” he says. </div>
<br><div> This begs the questions: What information can be found on the Internet about your company and employees? Could confidential data on emails be found by web crawlers or could key metadata attached to documents and images be used to gain insight into the internal structures of your organisation? </div>
<br><div> As we’ve noted, apparently innocent online data may be used by hackers to exploit vulnerabilities within your company. For example, the advertising of job vacancies may present attentive hackers with opportunities. If you are hiring SQL database engineers, for instance, hackers will realise that there are SQL servers that could be hacked within your company. </div>
<br><div> If information finds its way on to the Internet about the hobbies or interests of senior executives, it may be used by hackers to launch phishing attacks. Perhaps a CFO has a penchant for water-skiing. He or she may be asked to click on bogus websites featuring the latest boating and skiing equipment - with disastrous results. </div>
<br><div> Securing a company’s secrets is the task of experienced professionals who are trained to look at apparently-harmless company data through the eyes of the cybercriminal and use knowledge gained through the study and evaluation of countless security breaches to protect and fortify your organisation.&nbsp; </div>
<br><div><br></div></div></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 25 Aug 2025 13:11:38 +0000</pubDate></item><item><title><![CDATA[What constitutes a comprehensive patch management policy?]]></title><link>https://www.cyberinsight.co.za/blogs/post/what-constitutes-a-comprehensive-patch-management-policy</link><description><![CDATA[By definition, a patch is a set of changes to a computer program or its supporting data designed to update or improve it. Significantly, patches have ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sVr6QthbR-OQcnD66jn3YA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wIEiHz2oTwKfHO-GSeBMKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_uZvSp0fTTWWDvOC89a2NjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_h1jIdCLPQFyFN3Y8HaJ7Nw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_h1jIdCLPQFyFN3Y8HaJ7Nw"] h2.zpheading{ font-family:'Montserrat',sans-serif; font-size:48px; font-weight:400; line-height:50px; } </style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-family:Montserrat, sans-serif;">From Log4Shell to remote workforce vulnerabilities — why timely updates and automated patching are critical for cybersecurity resilience.</span></h2></div>
<div data-element-id="elm_BeDbB53DaSq2Dvgs--_9OQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_BeDbB53DaSq2Dvgs--_9OQ"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_BeDbB53DaSq2Dvgs--_9OQ"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div><div data-element-id="elm_zpCaJOCBRS6MfXdgd657Gw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div> By definition, a patch is a set of changes to a computer program or its supporting data designed to update or improve it. Significantly, patches have become synonymous with fixing security vulnerabilities and other “bugs”. </div>
<br><div> Patch management is the process of overseeing the systematic deployment of these updates and fixes in order to correct errors or improve the cybersecurity associated with operating systems, software applications and embedded systems.&nbsp; </div>
<br><div> The goal of a comprehensive patch management policy is to help protect every asset within your environment, irrespective of category, from exploitation.&nbsp; </div>
<br><div> With the recent and ongoing increases in the discovery of malware and other high-risk vulnerabilities in many computer systems, a comprehensive patch management policy is now essential to ensure that new patches are deployed as soon as they become available. </div>
<br><div> Such a policy should be able to identify the most critical challenges facing your security team – challenges that need to be addressed as a matter of urgency – and differentiate them from tasks that should be evaluated as part of your long-term strategy. </div>
<br><div> Without a comprehensive patch management policy in place, there is a strong chance that you could “shut the stable door after the horse has bolted”. In other words, a patch or update may well be applied too late to prevent a virulent bug from infiltrating your systems, stealing confidential data or inflicting severe damage. </div>
<br><div> The recent Log4Shell bug represents a case in point. Unfortunately, the vulnerability was revealed before a patch was made available so there was little that could be done by security managers and IT staff other than slog through the Log4Shell vulnerability patching process “after the fact”. </div>
<br><div> Fortunately, Cyber Insight was one of the first companies to offer a free vulnerability scan specific to Log4Shell which proved to be of great assistance to many IT specialists who were able to return to their festive celebrations without too much delay, secure in the knowledge that any possible security holes were covered and the hackers were being kept at bay. </div>
<div><br></div><div> Nevertheless, events such as the arrival of Log4Shell have highlighted the importance of maintaining an up-to-date software inventory to assist with the management of software updates and patches. </div>
<br><div> A comprehensive, fully automated patch management policy should also incorporate the management of software licences for third-party applications in Microsoft’s 365 Admin Centre. This process should include subscription management as well as the supervision of routine invoicing and payment procedures. Nothing should be overlooked or “allowed to fall through the cracks”. </div>
<br><div> Such a policy ought to also apply to software-as-a-service apps that you may purchase directly and, where appropriate, cover app and subscription management through third-party app providers’ portals. </div>
<br><div> With the concept of the remote workforce expected to gain broad acceptance in 2022, it is necessary to keep corporate endpoints secure thereby ensuring employees’ protection from the latest vulnerabilities no matter where they are located. </div>
<br><div> With legacy on-premises security systems often struggling to cope with the work-from-home boom, a comprehensive patch management policy is increasingly necessary to handle the patching and configuring of remote systems at scale and orchestrate feature/functionality updates.&nbsp; </div>
<br><div> Such a policy, well implemented, will help all workers gain access to the latest, most secure software products and computer systems currently available thereby maximising efficiency and optimising productivity. </div>
<br><div><br></div></div><p></p></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 25 Aug 2025 13:03:00 +0000</pubDate></item><item><title><![CDATA[Password protection is more critical than ever. Here are ten top tips]]></title><link>https://www.cyberinsight.co.za/blogs/post/password-protection-is-more-critical-than-ever.-here-are-ten-top-tips</link><description><![CDATA[Why weak passwords still put global giants at risk — and how you can strengthen your own defences with practical steps today.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_S0pNRe-VT4yluVjaPgJYPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1gVzf_qGSKaOGXUsN_3wPQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_o84RO0l4Tr2AX6Wg6kSpcg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9RNjhm9HSNq5qJwcPtM9Vg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why weak passwords still put global giants at risk — and how you can strengthen your own defences with practical steps today.</span></h2></div>
<div data-element-id="elm_bjUl5_80QYqSRNHdcP0hLQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;"><span>If you believe that the tech giants like Reddit, Wikipedia and Amazon are at the cutting edge when it comes to cybersecurity and password hygiene, think again.<br><br></span></p><p style="text-align:left;"><span>Acclaimed author Jordan True, who focused the spotlight on a 2019 University of Plymouth research project, reveals that these colossuses of the IT industry have not been too scrupulous when it comes to accepting poor passwords from users in the past. Perhaps they have upped their game in recent times?<br><br></span></p><p style="text-align:left;"><span>“This is incredibly alarming as it perpetuates the use of weak passwords,” she warns. “Nearly every common password was accepted [by the tech companies mentioned] which included repeats of the username, the user’s own name and, of course, the all-time classic, ‘password’.”<br><br></span></p><p style="text-align:left;"><span>Cybersecurity has always been important, but&nbsp;it has become critical today as cybercriminals continue to develop and perfect new and&nbsp;innovative ways to hack accounts and steal your personal data.<br><br></span></p><p style="text-align:left;"><span>So, do you think you can do better and pull one over on the tech gurus? It’s easier than you might think - but only if you closely follow the rules. Here are ten top examples:<br><br></span></p><p style="text-align:left;"><span>(1) Do not re-use passwords. It might be tough to remember a different password for each account or application, but that’s what password managers are meant for.</span></p><p style="text-align:left;"><span>(2) Use randomised passwords. Family and other familiar names are easy to hack. Be creative and dream up some unique words. Better still, make sure these words are not found in the Oxford Dictionary.</span></p><p style="text-align:left;"><span>(3) Use more than eight characters in a combination of letters (upper and lower case), symbols and numbers. The longer the password the better.</span></p><p style="text-align:left;"><span>(4) &nbsp;Do not use personal information.</span></p><p style="text-align:left;"><span>(5) Don’t document (write down) passwords where they might be discovered by colleagues, associates or curious visitors.</span></p><p style="text-align:left;"><span>(6) Be wary of unfamiliar devices or devices that you do not control. Your password may be compromised by a keylogger.</span></p><p style="text-align:left;"><span>(7) Change passwords on a regular basis. It might be a chore, but its easily done if you put your mind to it. Make a date with your computer.</span></p><p style="text-align:left;"><span>(8) Do not use default passwords. On many systems, a default administrative account exists which is set to a simple default password. These are easy to hack.</span></p><p style="text-align:left;"><span>(9) Boost corporate cybersecurity by storing user passwords in a way that prevents them from being obtained by attackers, even if the system or application is compromised.</span></p><p style="text-align:left;"><span>(10) Use two-factor (or multi-factor) authentication where possible. Google has introduced the practice, and it’s one of the best examples of password hygiene around. <br><br></span></p><p style="text-align:left;"><span>At Cyber Insight we encourage companies to introduce and enforce strong password policies while following stringent password protocols. They should be made applicable to all stakeholders - including employees, associates, customers and suppliers – and overseen by effective password management solutions.<br><br></span></p><p style="text-align:left;"><span>Cyber Insight’s plan for <i>Secure Future Protection</i> includes guidelines for enhancing password policies and advocates the application of next-generation tools that can discover and prevent weak passwords while defending against “password cracking” and other authentication-based attacks.</span></p></div>
<p></p></div></div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 25 Aug 2025 12:21:12 +0000</pubDate></item><item><title><![CDATA[Does ransomware’s evolution point to a cybercrime apocalypse?]]></title><link>https://www.cyberinsight.co.za/blogs/post/Does-ransomware-s-evolution-point-to-a-cybercrime-apocalypse_</link><description><![CDATA[One of the first ransomware attacks ever documented was the AIDS Trojan – also known as the PC Cyborg Virus. Conceived in 1989, it was released on 20, ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_tRKXotJPT32IfWX2niDk2g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1hdGYjgURf6zH9mnmaftfQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1cG7EGI8RWSYfeDkFa6-9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LsV3kWp_S3Gs7P-DKVQsBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><b><span><span>From the AIDS Trojan to RaaS, tracing the rise of ransomware and its devastating impact on global industries.</span></span></b></span></h2></div>
<div data-element-id="elm__dZE0LgsSbu8js3zPU2mZA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span style="font-size:24px;">One of the first ransomware attacks ever documented was the AIDS Trojan – also known as the PC Cyborg Virus. Conceived in 1989, it was released on 20,000 infected floppy diskettes labelled “AIDS Information – Introductory Diskettes” and disseminated to attendees at the World Health Organization's AIDS conference in Stockholm. <br><br></span></p><p></p><div><div><span style="font-size:24px;"></span><p><span style="font-size:24px;">The trojan hid directories and encrypted the names of the files on target computers. To regain access, victims were required to send $189 to the PC Cyborg Corporation.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">The AIDS Trojan, designed and developed by Harvard-trained biologist Joseph Popp (who never faced legal consequences for his actions), is seen today as the prototype for all subsequent ransomware attacks. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">With the popularisation of the Internet in the mid-2000s,&nbsp;cyber criminals realised that ransomware could be monetised on a much wider scale and they began using asymmetric RSA (Rivest–Shamir–Adleman) encryption as their encoding medium.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">The&nbsp;GPcode, which initially spread via an email attachment purporting to be a job application, used a 660-bit RSA public key cryptosystem, while the GPcode.AK – following hot on its heels - appeared using a 1024-bit RSA key.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">From 2011 ransomware attacks skyrocketed. Around 60,000 new ransomware variants were detected that year, a figure that doubled in 2012 and quadrupled by 2015. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Today there are countless strains of ransomware, although from 2016 onwards variants seem to have coalesced into two main categories, “crypto” and “locker”. More recently “double extortion” and ransomware as a service (RaaS) have grown in popularity within the cybercriminal fraternity.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Crypto ransomware variants are mainly spread via email. Generally, this is the attackers’ <i>modus operandi</i>: They first identify a target, probably an employee in a specific company.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">They will undertake research. For example, if the criminals discover the target’s Facebook account, they might realise that he – or she – is an animal-lover and is interested in animal welfare. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">It then becomes a straightforward task for the criminals to send a well-crafted email focusing on issues related to animal welfare to the target who, in many cases, will naively open its attachment (containing the ransomware) without realising the huge risks associated with this simple action.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Locker ransomware, on the other hand, does not encrypt files. It takes the distinctive route of locking its victims out of their devices. Cybercriminals will demand a ransom to simply reopen the virtual door.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">The first hint of a further ransomware evolution came when cybercriminals began to encrypt network accessible resources. In 2017, WannaCry ransomware infected more than 200 000 computer systems in 150 countries, causing billions of dollars in damages. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">It was the speed at which WannaCry spread that represented a watershed in the cybersecurity environment and marked the first of what became known as fifth-generation cyberattacks. Another fifth-generation variant was NotPetya, the first nation-state-sponsored ransomware attack.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Since these perceived achievements, cybercriminals have again raised their game, Double extortion malware is now able to launch devastating, multistage attacks on target organisations.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">It works by first exfiltrating or removing and storing confidential data from the organisation – not encrypting or deleting it. If the target fails to meet demands, its data and the proprietary information contained therein is leaked online or sold to the highest bidder. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Fifth-generation ransomware and double extortion techniques are changing the threat landscape and priming it for RaaS. <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">RaaS, as described by cyberthreat researcher and author Jeff White, is “a business for criminals, by criminals”. RaaS businesses provide ransomware to affiliates, usually on the basis of monthly fees and agreements, “like a perverted version of a media streaming service delivering new content directly to their subscribers,” he explains.<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">White adds that through RaaS, cybercriminals are able to tailor their ransomware attacks to address certain target groups. “This flexibility increases their capabilities and allows them to adapt through trial and error until they find the right mix.”<br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Is the globe, thanks to RaaS, gearing up for a cybercrime apocalypse? And is your organisation in its path? <br><br></span></p><span style="font-size:24px;"></span><p><span style="font-size:24px;">Reports highlight a number of industry sectors that have been preferred ransomware targets in 2021. Construction companies were hardest hit – according to one survey - largely as a result of lax cybersecurity in this sector. Also on the list are the manufacturing, consumer goods and services, finance, insurance, travel and hospitality, healthcare and education sectors.<br><br></span></p><div><p><span>According to Tiago Henriques, a director at cybersecurity insurance company Coalition, ransomware attacks are often successful because "bad actors know that causing business disruptions [particularly in these sectors] can be a strong motivator for companies to pay ransom demands to get back up and running.”</span></p></div>
<br><p></p></div></div></div></div><div data-element-id="elm_3BVwHtrtQqWWP3Jx4DmluQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 25 Aug 2025 11:20:11 +0000</pubDate></item></channel></rss>