Cookie Consent by FreePrivacyPolicy.com Skip to main content

Proactive cyber security in a volatile business environment

By 28th July 2020January 6th, 2021Security
proactive cyber security

From sophisticated cybercrime to water shortages and climate change, every modern business faces many threats daily. Arguably, cybercrime is one of the most dangerous and prolific threats facing business leaders today, with ransomware attacks, in particular, proving to be a highly effective tool for cybercriminals. This year, apart from COVID-19, ransomware has dominated the cybersecurity landscape, with businesses large and small paying millions of dollars to unlock encrypted files.  In the local context, Turrito’s most common IT disaster in 2019 (and going into 2020) was Ransomware related. Businesses need to look into proactive cyber security.

Cyber security company Kaspersky has noted that malware attacks in South Africa increased by 22 percent in the first quarter of 2019 compared to the first quarter of 2018.

In response to such a volatile and risky operating environment, local businesses have to place renewed emphasis on their business continuity and disaster recovery strategies. Too often, there are no such strategies or plans in place – which makes companies highly vulnerable.   Having a backup is no longer good enough.

Forty-three percent of cyberattacks are aimed at small businesses, but only 14% are prepared to defend themselves, according to Accenture.’ This is a worrying statistic, particularly when some reports have indicated that up to 75 percent of businesses fail within three years after a major disaster.

Turrito regularly helps businesses devise smart continuity plans and establish robust disaster recovery mechanisms – without breaking the bank. In many instances, this requires harnessing new cloud and data management platforms, as well as ensuring extremely robust connectivity solutions.  Nowadays businesses need IT professionals who can constantly scour the risk landscape and assist in taking a proactive cyber security approach…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.