Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025

2025-08-31

BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions

2025-08-31

SUI Price Prediction: Remittix Expected To Rise Over 4,000% This Year After Winning Top Crypto Presale Award

2025-08-31
Facebook X (Twitter) Instagram
Trending
  • Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»5 Cybersecurity Best Practices For Businesses To Better Support Their Workforces
Opinion

5 Cybersecurity Best Practices For Businesses To Better Support Their Workforces

Andrew BourneBy Andrew Bourne2021-10-27No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
tech
Andrew Bourne, Region Manager, Africa, Zoho Corporation
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

It has been almost two years since the pandemic began, with the first lockdown in March 2020 forcing businesses to adopt a remote working approach. Now that South Africa is opening up, a hybrid model is quickly becoming the norm, with employees splitting their time between the office and their home. As a result, the IT department’s role has become more complicated than ever, owing to the rapid increase in remotely connected devices. Cyberattacks have, in turn, become more common.

The most high-profile cyberattack happened in July, when Transnet, the state-owned railway company, was forced to shut down for a week. This attack, however, was only one of many, as global statistics show that a cyberattack takes place every 11 seconds.

With October being Cyber Security Awareness Month, organisations should use this opportunity to re-evaluate the safeguards they’ve implemented and also add new measures if their workforce is largely distributed.

This article looks at five factors that businesses can implement to secure their workforce:

  1. Clearly define security policies and procedures

When establishing policies and standards, companies must consider their cloud platforms, software development lifecycles, DevOps procedures and technologies, and compliance with regional regulations. Basic security hygiene alone is not sufficient at the enterprise level to protect against advanced cyberattacks.

When putting together policies, businesses should keep in mind the following:

  • Consider current threats, compare them to industry standards, and devise a comprehensive security strategy.
  • Publish transparent security policies and standards internally to assist internal stakeholders in making critical security decisions.
  • Set goals, processes, and accountability to achieve the overall company’s security policies and standards.
  1. Train, equip, and reward

It is important to educate all employees on the evolving threat landscape. Businesses should educate all stakeholders about the many types of dangers – from phishing to ransomware to social engineering. Are your staff aware of these threats, the damaging results of such an attack, and trained to know what to do and whom to call in the event of an attack?

Businesses should provide basic security tools to their employees, such as password managers, multi-factor authentication, data backup, and behaviour threat analytics. Threat analytics, especially, can help warn users and administrators when an account is accessed from an unknown IP during odd hours. Also consider incentivising employees with a rewards program. For instance, internal cybersecurity and bug bounty initiatives at Zoho have aided immensely in educating and rewarding responsible staff.

  1. Protect identities and access keys

Identity and key protection should be a primary priority for every cybersecurity team. It’s critical to securely authenticate and authorise individuals, services, devices, and apps to ensure that only valid accounts/devices are able to access the company’s data. For example, many businesses now use SSH keys and SSL certificates in the background to perform safe cryptographic operations.

When it comes to identity management, the beginning point is to implement tactics such as strong passwords, passwordless authentication, multi-factor authentication, role-based access, identity-based perimeters, and zero-trust access control strategies.

  1. Secure the endpoints

Once an identity has been granted access, a user can gain access to numerous endpoints and applications owned by the company using the identity. In a hybrid environment, enterprise data is communicated over smartphones, IoT devices, BYOD, cloud servers, and more, and many companies still rely on traditional firewalls and VPNs to restrict access. Rather than relying on these legacy models, companies should adopt a least-privilege access strategy for users, applications, systems, and connected devices. It’s important to provide only a minimum level of access based on job roles and responsibilities. This technique has the following important benefits:

  • Cyberattack surface is reduced
  • Better control on malware spread
  • Increased efficiency in compliance and audits
  1. Keep applications up to date

Unpatched systems and apps are some of the easiest targets for hackers. Whenever a new security patch is issued, attackers will attempt to exploit the flaw before the patch is applied in order to obtain access to corporate data. Thus, enterprises should take advantage of patch management and vulnerability management tools that offer immediate implementation. Other benefits include improved efficiency and simplified compliance, helping avoid unwarranted fines.

Businesses in South Africa are currently more interconnected than they have ever been. While this is a development that will help many industries thrive, it also implies that businesses must prioritise cybersecurity to ensure successful benefits realisation. The truth is that it’s a matter of ‘when,’ not ‘if,’ your company will be targeted, and being prepared with a robust cybersecurity and resilience strategy is the greatest defence.

  • Andrew Bourne, Regional Manager – Africa, Zoho Corp.

cyberattack cybersecurity remote working
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Andrew Bourne

Related Posts

Amid Uncertainty, Navigating The AI transition, A Roadmap For Africa

2025-08-26

Where Are The Black Investors And VCs?

2025-08-25

Why South Africa Is The Hidden Powerhouse For Global Executive Search

2025-08-25

Your WiFi Router Is About To Start Watching You

2025-08-21

Disaster-Proofing the Stack: Why Industries Are Failing the Infrastructure Test

2025-08-21

It’s Time To Fight AI With AI In The Battle For Cyber-Resilience

2025-08-20

Securing Our Data In The Fast (Payments) Lane

2025-08-19

What Businesses Should Be Doing Instead Of Buying More Tech

2025-08-08

Africa’s Innovations Are Overlooked Because Global Measures Don’t Fit: What Needs To Change

2025-08-05
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

BankservAfrica Rebrands As PayInc

The financial market infrastructure giant BankservAfrica has officially been rebranded to PayInc. The launch, held…

KZN’s First Supercar-Centric Luxury Residential Development Unveiled

2025-08-27

Government Pensions Administration Agency CEO Placed On Precautionary Suspension

2025-08-26

Airtel Africa & Vodacom Forge Landmark Infrastructure Partnership

2025-08-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

SA’s Skhokho 2.0 Puts Enterprise AI In SME Hands

2025-08-28

Please Call Me: After 25 Years, Will SCA’s New Bench Silence ConCourt?

2025-08-26

Vodacom Invests R400M To Expand Network In Free State And Northern Cape

2025-08-26

Elon Musk’s Starlink Backs BEE Equity Equivalents, Not 30% Ownership

2025-08-18

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025

2025-08-31

BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions

2025-08-31

SUI Price Prediction: Remittix Expected To Rise Over 4,000% This Year After Winning Top Crypto Presale Award

2025-08-31
Recent Posts
  • Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025
  • BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions
  • SUI Price Prediction: Remittix Expected To Rise Over 4,000% This Year After Winning Top Crypto Presale Award
  • Ethereum Price Heading Towards $4,000 As Crypto Markets Drop But This Altcoin Continues To Surge
  • XLM Price Prediction In September & Which Altcoins Could Rise Over 25x Next Month
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.