Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24

GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)

2026-01-24
Facebook X (Twitter) Instagram
Trending
  • Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Breaking News»How to protect yourself from cyberattack
Breaking News

How to protect yourself from cyberattack

Gugu LourieBy Gugu Lourie2015-10-17No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

 

It is easy to get lost in a sea of information when looking at cybersecurity issues. And hearing about hacks and cyberattacks as they happen is a surefire way to feel helpless and totally disempowered. By Robert Potter 


What follows is a sort of future shock, where we become fatalistic about the problem. After all, 86% of organisations from around the world surveyed by PwC reported exploits of some aspect of their systems within a one year period. That represented an increase of 38% on the previous year.

However, once the situation comes into focus, the problem becomes much more manageable. There are a range of things that can we can easily implement to reduce the risk of an incident dramatically.

For example, Telstra estimates that 45% of security incidents are the result of staff clicking on malicious attachments or links within emails. Yet that is something that could be fairly easily fixed.

Confidence gap

There is currently a gap between our confidence in what we can do about security and the amount we can actually do about it. That gap is best filled by awareness.

Many organisations, such as the Australian Centre for Cyber Security, American Express and Distil Networks provide basic advice to help us cope with future shock and start thinking proactively about cybersecurity.

The Australia Signals Directorate (ASD) – one of our government intelligence agencies – also estimates that adhering to its Top Four Mitigation Strategies would prevent at least 85% of targeted cyberattacks.

So here are some of the top things you can do to protect yourself from cyberattacks:

1) Managed risk

First up, we need to acknowledge that there is no such thing as perfect security. That message might sound hopeless but it is true of all risk management; some risks simply cannot be completely mitigated.

However, there are prudent treatments that can make risk manageable. Viewing cybersecurity as a natural extension of traditional risk management is the basis of all other thinking on the subject, and a report by CERT Australia states that 61% of organisations do not have cybersecurity incidents in their risk register.

ASD also estimates that the vast majority of attacks are not very sophisticated and can be prevented by simple strategies. As such, think about cybersecurity as something that can managed, rather than cured.

2) Patching is vital

Patching is so important that ASD mentions it twice on its top four list. Cybersecurity journalist Brian Krebs say it three times: “update, update, update”.

Update your software, phone and computer. As a rule, don’t use Windows XP, as Microsoft is no longer providing security updates.

Updating ensures that known vulnerabilities are fixed and software companies employ highly qualified professionals to develop their patches. It is one of the few ways you can easily leverage the cybersecurity expertise of experts in the field.

3) Restricting access means restricting vulnerabilities

The simple rule is: don’t have one gateway for everything. If all it takes to get into the core of a system is one password, then all it takes is one mistake for the gate to be opened.

Build administrator privileges into your system so that people can only use what they are meant to. For home businesses it could mean something as simple as having separate computers for home and work, or not giving administrator privileges to your default account.

It could also be as simple as having a content filter on employee internet access so they don’t open the door when they accidentally click on malware.

4) Build permissions from the bottom up

Application whitelisting might sound complicated, but what it really means is “deny by default”: it defines, in advance, what is allowed to run and ensures that nothing else will.

Most people think of computer security as restricting access, but whitelisting frames things in opposite terms and is therefore much more secure. Most operating systems contain whitelisting tools that are relatively easy to use. When used in conjunction with good advice, the result is a powerful tool to protect a network.

Simple things first

Following these basic rules covers the same ground as ASD’s top four mitigation strategies and substantially lowers your vulnerability to cyberattack. If you want to delve deeper, there are more tips on the ASD site.

There are many debates that will follow on from this, such as: developing a national cybersecurity strategy; deciding if people should have to report an incident; the sort of insurance that should be available; what constitutes a proportionate response to an attack; and a whole range of others.

Each of those debates is underpinned by a basic set of information that needs to be implemented first. Future shock is something that can be overcome in this space, and there are relatively simple measures that can be put into place in order to make us more secure. Before embarking on anything complicated, we should at least get these things right.

  • Robert Potter is a PhD Candidate Political Science, The University of Queensland
  • This article was originally published on The Conversation
  • Email TechFinancials.co.za at [email protected]

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie
Gugu Lourie

Related Posts

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12

How SA’s Largest Wholesale Network is Paving the Way for a Connected, Agile Future

2025-12-02

Oni-Tel Launches Inter-Data Centre Fibre Network With Digital Parks Africa As First Point Of Presence

2025-11-27

Vodacom Announces Multi-Year Strategic Collaboration With Google Cloud to Boost Africa’s AI Advancement

2025-11-25

Telkom Consumer Fuels Growth With Prepaid, Data Strategy

2025-11-18

Digital Public Infrastructure: The Need for Leadership And Sovereignty In South Africa’s Digital Future

2025-11-03
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Chery SA to Buy Nissan Rosslyn Plant, Save Jobs

In a major development for South Africa’s automotive industry, Nissan and Chery SA have reached…

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Over R270M In Phuthuma Nathi Dividends Remain Unclaimed

2025-11-27

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H

2026-01-24

Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion

2026-01-24

GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)

2026-01-24
Recent Posts
  • Ethereum (ETH) Stalls at $3200, but Investors Back GeeFi’s (GEE) Upcoming Expansion With $300K Raised in 24H
  • Cardano (ADA) Climbs 9%, but Experts Predict Investors Could Earn Millions from GeeFi’s (GEE) Upcoming Ecosystem Expansion
  • GeeFi’s (GEE) Phase 3 Hits 90% as New App and Roadmap Update Highlights Stronger Privacy Focus Than Tron (TRX)
  • AI Girlfriend Applications Tested for Context Awareness and Personalization
  • Why more and more investors are no longer “waiting for the market” and choosing daily income from crypto
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.