Close Menu
  • Homepage
  • News
  • Cloud
  • ECommerce
  • Entertainment
  • Finance
  • Security
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Telkom Champions Youth Empowerment At Trialogue Conference

2025-05-13

Soweto Teens Turn Heads With Flashy Custom BMX Bike Showcase

2025-05-13

April 2025 Used Car Sales Show Resilience Despite Slight Decline

2025-05-13
Facebook X (Twitter) Instagram
Trending
  • Telkom Champions Youth Empowerment At Trialogue Conference
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud
  • ECommerce
  • Entertainment
  • Finance
  • Security
  • Podcast
  • Contact
TechFinancials
Home»Opinion»Comprehensive Preparation Will Contain The Fall-Out From Ransomware Attacks
Opinion

Comprehensive Preparation Will Contain The Fall-Out From Ransomware Attacks

One should also consider whether it is necessary to brief public relations firms (through your attorneys) to explain the incident to data subjects and to ensure that what is said is both legally sufficient and expressed in a way that best protects the company’s reputation.
ContributorBy Contributor2023-10-24No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Hackers
Masked Hacker. Gorodenkoff / Shutterstock.com
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ransomware attacks have been rising and it is companies that have a high level of preparedness who are weathering the storm. The Sophos State of Ransomware in South Africa 2023 report found that 78% of South African organisations surveyed had experienced an attack in the preceding year, up from 51% in the 2022 survey.

Ransomware attacks introduce malicious software into a company’s systems.

“The usual pattern our clients experience is that late on a Friday evening or a Saturday morning, company management is notified by the IT department that the Company has lost access to essential files, and has received a demand for money, usually in the form of bitcoin, to release the files,” says Blom.

“Typically, up to six months before the event, a hacker has accessed the company’s system and stored a virus that gathered confidential information. Once enough information has been accumulated, the hacker locks down the files.”

Tembedza urges companies to put a three-step strategy in place. The first is to mitigate the risk before any event occurs, the second is to manage an event, and the third step is to review controls and processes regularly, given that technology and threats are constantly evolving.

Mitigation

Tembedza says companies should ensure they have taken reasonable steps to protect their systems, taking into consideration the particular types of breaches to which they are susceptible. The Protection of Personal Information Act (POPI) requires companies to have appropriate, reasonable, and technical organisational measures in place. This involves assessing access controls, policies relating to the utilisation of IT infrastructure and procedures for regular maintenance and review of safety systems.

Organisations must have a plan to deal with a data breach (in this case, a ransomware attack) that sets out how employees should act, who they must notify and how the organisation will approach the Information Regulator and affected data subjects to notify them of the incident.

Blom says a highly regulated entity operating in a sector such as banking, financial service, health care and even education may have to comply with requirements specific to that sector, in addition to POPI.

Two other laws apply along with POPI in the event of a ransomware incident, he says. The first is the Prevention and Combating of Corrupt Activities Act (PRECCA), which requires a company to notify the South African Police Services (SAPS) when certain crimes like fraud or extortion, with a value of over ZAR 100 000, are committed. The second relevant law is the Cyber Crimes Act. A financial institution or telecommunications network operator that suffers any cybercrime (which could be a broad range of crimes from fraud to extortion) must report the crime to the SAPS (although this requirement is currently suspended).

Management

If a data breach has occurred (arising out of the ransomware attack), POPI requires that certain steps be taken, primarily relating to notification, says Tembedza. This includes notifying:

(i)            affected data subjects; and

(ii)           the Information Regulator,

as soon as reasonably possible following the event.

Employees must follow the company’s procedures when making any notifications.

The company should notify its insurers, assuming it has insurance in place to cover cyber-attacks.  Where insurance is in place, the company must ensure that it adheres to the terms of its policy.

It is important to take legal advice on what actions are permissible to recover your information and systems following a ransomware attack.  While often unlikely, certain actions may create further liability for a victim (for example, making payment of a ransomware amount to an attacker in a sanctioned country or attempting to pursue a ‘vigilante-type’ response.

One should also consider whether it is necessary to brief public relations firms (through your attorneys) to explain the incident to data subjects and to ensure that what is said is both legally sufficient and expressed in a way that best protects the company’s reputation, says Blom.

In all cases, companies that fare the best in these situations are those who:

(i)            respond to the incident quickly;

(ii)           have taken reasonable precautions (such as implementing robust backup systems);

(iii)          hold appropriate insurance cover (and adhere to those terms);

(iv)          brief attorneys prior to notifying their insurers, affected data subjects and the Information Regulator; and

(v)           where necessary, brief forensic investigators and/or public relations experts through their attorneys.

Listen to Tembedza and Blom, dive into the alarming and rapidly evolving world of these cyber threats, here.

  • Wendy Tembedza & Karl Blom, Partners at Webber Wentzel

Cybercriminals data breach Hackers POPI ransomware attacks
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Contributor

Related Posts

AI Drives Inclusive Future Tackling SA’s Unemployment And Inequality

2025-05-13

How Tech Taxation Policy Is Key To Improving Africa’s Usage Gap

2025-05-12

How Tech Is Reshaping Africa’s Development Trajectory

2025-05-12

SA Post Office Can Digitally Transform Rural Communities

2025-05-11

How To Tell If A Photo’s Fake? You Probably Can’t. That’s Why New Rules Are Needed

2025-05-09

AI Could Be A Game Changer For Africa’s Youth

2025-05-09

Degrees Alone Won’t Save South Africa’s Economy — Skills Will

2025-05-07

South Africa’s ICT Sector Needs A New Path

2025-05-02

SA’s AI Crossroads: Embrace The Future Or Face Economic Obsolescence

2025-05-01
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Minister Nkabane Appoints ANC Cadres, Mantashe’s Son To SETA Boards

A leaked list of appointments to Sector Education and Training Authority (SETA) boards has revealed shocking political patronage, with ANC loyalists,…

Cassava & Zindi Partner To Boost African AI Innovation

2025-05-12

TV Licences Are Outdated, But Is A Streaming Levy The Right Fix?

2025-03-17

US-China Trade Wars: Their Impact On Africa

2025-03-07
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

Eskom Implements Stage 2 Loadshedding: 16:00-22:00 Till Thursday

2025-05-13

Why Cybersecurity Must Support South Africa’s Local By-Elections

2025-05-12

Phygital Shopping Rises In SA: Blending Online & In-Store

2025-04-18

Foreigner Nabbed With 554 Cellphones Worth R2.5m In Bloemfontein

2025-04-18

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Telkom Champions Youth Empowerment At Trialogue Conference

2025-05-13

Soweto Teens Turn Heads With Flashy Custom BMX Bike Showcase

2025-05-13

April 2025 Used Car Sales Show Resilience Despite Slight Decline

2025-05-13
Recent Posts
  • Telkom Champions Youth Empowerment At Trialogue Conference
  • Soweto Teens Turn Heads With Flashy Custom BMX Bike Showcase
  • April 2025 Used Car Sales Show Resilience Despite Slight Decline
  • Eskom Implements Stage 2 Loadshedding: 16:00-22:00 Till Thursday
  • Minister Nkabane Appoints ANC Cadres, Mantashe’s Son To SETA Boards
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.