All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2745372",
"signature": "Article:2745372",
"url": "https://staging.dailymaverick.co.za/article/2025-06-03-data-breaches-and-cyber-vulnerabilities-sas-troubling-lack-of-readiness-revealed/",
"shorturl": "https://staging.dailymaverick.co.za/article/2745372",
"slug": "data-breaches-and-cyber-vulnerabilities-sas-troubling-lack-of-readiness-revealed",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Data breaches and cyber vulnerabilities - SA's troubling lack of readiness revealed",
"firstPublished": "2025-06-03 11:07:51",
"lastUpdate": "2025-06-03 06:08:48",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "26",
"name": "Sci-Tech",
"signature": "Category:26",
"slug": "sci-tech",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/sci-tech/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": false
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 9671,
"contents": "<span style=\"font-weight: 400;\">Simultaneously, </span><a href=\"https://hooklineandsinker.sharepoint.com/:b:/s/HookLineSinker/EdMLaP8e5qFFnumE5eGbslIB3Lym1P-O5np9xUy2Kw50Yw?e=2ZmGXi\"><span style=\"font-weight: 400;\">Cisco’s 2025 Cybersecurity Readiness Index</span></a><span style=\"font-weight: 400;\"> reveals a dangerous disconnect — while 85% of local companies believe they're prepared, just 7% meet the “mature” threshold for actual cyber resilience. Daily Maverick’s examination of leaked data on the dark web confirms a troubling truth: South African data is leaking at an industrial scale, driven by poor cyber hygiene and a digital environment outpacing its own defences.</span>\r\n<h4><b>Less than zero: South Africa’s scorecard</b></h4>\r\n<span style=\"font-weight: 400;\">South African Airways (SAA), the South African National Defence Force (SANDF), Experian, and Home Affairs — and as of last week, Mediclinic — the list goes on. South Africa has emerged as one of the primary countries targeted by hackers for data leaks and ransomware.</span>\r\n\r\n<b>Read more: </b><a href=\"https://www.dailymaverick.co.za/article/2023-09-06-snatched-sandf-data-leaked-in-cyberattack-appears-to-be-authentic-say-cybersecurity-analysts/\"><b>SNATCHed – SANDF data leaked in cyberattack appears to be authentic, say cybersecurity analysts</b></a>\r\n\r\n<span style=\"font-weight: 400;\">The Surfshark 2025 breach ranking places South Africa second in Africa and 37th globally, but more concerning is our upwards trajectory. Surfshark data shows a 164% increase in breach volume from the third quarter to the fourth quarter of last year, based on tracked accounts exposed in known breached databases. Meanwhile, </span><a href=\"https://newsroom.cisco.com/c/dam/r/newsroom/en/us/interactive/cybersecurity-readiness-index/2025/documents/2025_Cisco_Cybersecurity_Readiness_Index.pdf\"><span style=\"font-weight: 400;\">Cisco’s 2025 Cybersecurity Readiness Index</span></a><span style=\"font-weight: 400;\"> found that while 85% of South African firms claim confidence, most fall into “formative” or “beginner” categories, indicating an alarming gap between perception and preparedness.</span>\r\n\r\n<span style=\"font-weight: 400;\">Of far more import is the risk to the state and public sector. The SANDF breach of August 2023 revealed critical gaps in public sector cybersecurity. Operational schedules, internal communications, and staff details were dumped on public forums. Should a similar breach hit Eskom or Rand Water, the fallout could escalate from data loss to national service failure, severely undermining South Africa’s essential infrastructure.</span>\r\n<h4><b>Smashthestate: infrastructure in the crosshairs</b></h4>\r\n<span style=\"font-weight: 400;\">The SANDF breach wasn’t a one-off. Staff rosters, operational files, and internal communications were leaked with minimal resistance, revealing deep structural vulnerabilities — at the time that Daily Maverick viewed the page, the data had been downloaded 154 times. South African Airways (SAA) similarly saw both employee and passenger data compromised. Even the Department of Home Affairs — custodian of the national population register and biometric databases — has suffered multiple exposures.</span>\r\n\r\n<span style=\"font-weight: 400;\">In one case, a misconfigured public server linked to a third-party contractor’s testing environment left biometric fingerprint templates, ID numbers, and passport scans openly accessible online for more than two months before being taken down. </span>\r\n\r\n<span style=\"font-weight: 400;\">“The system wasn’t even behind a login — it was indexed by search engines,” confirmed Hendrik de Bruin, the head of SADC Security Consulting at Check Point in an interview with Daily Maverick. “Anyone with a browser could access high-value identity data in raw form.” </span>\r\n\r\n<span style=\"font-weight: 400;\">This not only violates basic data protection principles, but poses significant surveillance and identity theft risks, particularly given South Africa’s widespread use of biometrics for banking and social grants.</span>\r\n\r\n<span style=\"font-weight: 400;\">“There is no proper segmentation between operational tech and IT in many departments. That’s how you go from data loss to infrastructure failure,” continued de Bruin. “Public entities often rely on legacy systems patched together over decades, making them a soft target.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Telecom metadata leaks suggest even critical communications infrastructure is poorly protected — laying the groundwork for both surveillance and sabotage. The long-term concern, experts note, is not just data privacy, but systemic risk to national functioning.</span>\r\n\r\n<b>Read more:</b> <a href=\"https://www.dailymaverick.co.za/article/2024-06-05-tech-giants-step-up-innovations-to-address-cybersecurity-breaches/\"><b>Tech giants step up innovations to address cybersecurity breaches</b></a>\r\n<h4><b>An absent red team: the hollowing out of SA’s skills</b></h4>\r\n<span style=\"font-weight: 400;\">One of the most consistent failures is pre-emptive testing, with few state procurement contracts mandating red teaming or penetration testing. Instead, a culture of checkbox compliance dominates government IT planning, where simply having antivirus software counts as security preparedness.</span>\r\n\r\n<span style=\"font-weight: 400;\">“Breaches go undetected because no one’s even looking for them,” said De Bruin. “We have government departments that can’t afford even basic endpoint protection. Of course attackers will sit in those systems for weeks.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Cisco’s 2025 Index reinforces this point. </span>\r\n\r\n<span style=\"font-weight: 400;\">“Many organisations don’t even know what their perimeter looks like any more,” said Nabeel Rajab, a cybersecurity specialist at Cisco, presenting the index on Wednesday, 28 May 2025. “Cybersecurity is no longer just about a firewall — the attack surface has become broader and more dynamic.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The report found that 43% of South African organisations had experienced an AI-driven cyber incident in the past year, yet the majority remain reactive rather than proactive. </span>\r\n\r\n<span style=\"font-weight: 400;\">“More than half of organisations surveyed still operate in a mode of responding to attacks, rather than preventing them,” Rajab said.</span>\r\n\r\n<span style=\"font-weight: 400;\">Further, South African security leadership often lacked proper executive buy-in. “There’s a disconnect between chief information security officers and C-suite executives. Security leaders are not always at the decision-making table,” said Rajab.</span>\r\n\r\n<span style=\"font-weight: 400;\">“Most firms don’t run regular perimeter reviews. They outsource security and forget about it,” De Bruin added. “And with AI-driven phishing kits now available for $10 (R179) on Telegram, attackers don’t need to be sophisticated.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Moreover, there are opportunities for attackers to use third parties to gain access to sensitive data, as was the case with the recent </span><a href=\"https://mybroadband.co.za/news/security/596849-prominent-private-hospital-group-in-south-africa-hacked.html\"><span style=\"font-weight: 400;\">Mediclinic leak</span></a><span style=\"font-weight: 400;\">. The breach occurred earlier this year, and according to a statement by the medical group occurred through a third-party IT provider, probably providing payroll services, given that the stolen data primarily consisted of payroll information. </span>\r\n\r\n<span style=\"font-weight: 400;\">A Mediclinic media statement said: “We are confident that no patient data has been affected,” and confirmed that their systems had since been further secured. </span>\r\n<h4><b>Nation states and proxies — the advanced persistent threat in the room</b></h4>\r\n<span style=\"font-weight: 400;\">Advanced persistent threats (APTs) refer to highly sophisticated and sustained cyberattack campaigns, often orchestrated by nation-states or state-sponsored groups. Unlike ordinary cybercriminals who typically seek quick financial gain, APTs focus on long-term infiltration, data theft, surveillance, and even sabotage.</span>\r\n\r\n<span style=\"font-weight: 400;\">These actors use tailored malware, social engineering, and zero-day vulnerabilities to silently breach networks, maintain access over extended periods, and exfiltrate sensitive data — often without detection. </span><span style=\"font-weight: 400;\">\r\n</span><span style=\"font-weight: 400;\">\r\n</span><span style=\"font-weight: 400;\">APTs are typically aligned with strategic geopolitical objectives, such as espionage, infrastructure disruption, or influence operations. Their presence in South Africa suggests the country is being used as both a testbed and a foothold for broader regional campaigns.</span>\r\n\r\n<span style=\"font-weight: 400;\">Check Point’s 2025 threat map shows increased targeting of South African systems by advanced persistent threats (APTs) such as APT28 (Russia), Void Manticore (Iran), and Volt Typhoon (China).</span>\r\n\r\n<span style=\"font-weight: 400;\">“APT actors used to test in Eastern Europe. Now they test here,” said De Bruin. South Africa’s non-aligned foreign policy stance, paired with poor cyber defences, makes it an ideal “silent battleground.”</span>\r\n\r\n<span style=\"font-weight: 400;\">He added: “APT actors value South Africa because they can trial infrastructure payloads in the wild without triggering Nato’s red lines.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Cisco analysts also flagged this shift, noting that while countries like the US, Japan, and Germany have built mature cyber defences, countries like South Africa are increasingly being exploited as soft entry points for threat actors looking to test malware, exploit vulnerabilities, and gather reconnaissance.</span>\r\n\r\n<span style=\"font-weight: 400;\">“We’re building a smart state on insecure foundations. Without urgent reform, a breach will one day lead to a blackout — or worse,” Rajab warned.</span>\r\n<div style=\"background-color: #f5f5f5; border-left: 5px solid #ccc; padding: 16px; margin: 20px 0; border-radius: 6px;\">\r\n<h3 style=\"margin-top: 0;\">What this means for you</h3>\r\nThis isn’t just about your ID number being on Telegram. The bigger risk is systemic failure. The disruption of power grids, water systems, or air traffic control through ransomware or unauthorised access is no longer theoretical. It has happened elsewhere — in Ukraine, Iran, and the US. South Africa may be next.\r\n\r\nTwo laws govern cybercrime in South Africa: the Protection of Personal Information Act (Popia, 2013) and the Cybercrimes Act (2020). While Popia mandates breach notification, it lacks enforcement teeth. The Cybercrimes Act criminalises data interference — but with no national breach registry, no proactive SOC (Security Operations Centre) infrastructure, and limited prosecutorial momentum, its impact remains muted.\r\n\r\nThe Information Regulator, tasked with enforcing Popia, has issued only a handful of sanctions. There is no obligation for public disclosure of breaches beyond notifying affected individuals, meaning systemic risks are often hidden until too late.<span style=\"background-color: #ffffff;\"> </span>\r\n\r\n</div>\r\n<span style=\"font-weight: 400;\">“The biggest threat in South Africa is normalisation,” said De Bruin. “Once leaks become routine, so does failure.”</span>\r\n<h4><b>The price of doing nothing: national security</b></h4>\r\n<span style=\"font-weight: 400;\">The cost of inaction is no longer reputational — it’s operational and, in time, existential. Until cybersecurity is treated not as compliance window-dressing but as a survival imperative, the gap between attack and defence will only widen — with catastrophic potential.</span>\r\n\r\n<span style=\"font-weight: 400;\">South Africa’s cybersecurity response needs urgent reform: stronger legislation, competent enforcement, national breach transparency, and dedicated funding. </span>\r\n\r\n<span style=\"font-weight: 400;\">As Rajab concluded in his briefing: “Resilience isn’t built on confidence — it’s built on readiness. And right now, South Africa is confident, but not ready.” </span><b>DM</b>",
"teaser": "Data breaches and cyber vulnerabilities - SA's troubling lack of readiness revealed",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "511732",
"name": "Yeshiel Panchia",
"image": "https://www.dailymaverick.co.za/wp-content/uploads/2025/05/12-May-2025-YP-1-of-1-scaled.jpg",
"url": "https://staging.dailymaverick.co.za/author/yeshiel-panchia-2/",
"editorialName": "yeshiel-panchia-2",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12924",
"name": "SAA",
"url": "https://staging.dailymaverick.co.za/keyword/saa/",
"slug": "saa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SAA",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "40183",
"name": "SANDF",
"url": "https://staging.dailymaverick.co.za/keyword/sandf/",
"slug": "sandf",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SANDF",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "60989",
"name": "Cyberattack",
"url": "https://staging.dailymaverick.co.za/keyword/cyberattack/",
"slug": "cyberattack",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberattack",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "147229",
"name": "BUSINESS MAVERICK",
"url": "https://staging.dailymaverick.co.za/keyword/business-maverick/",
"slug": "business-maverick",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "BUSINESS MAVERICK",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "242446",
"name": "Mediclinic",
"url": "https://staging.dailymaverick.co.za/keyword/mediclinic/",
"slug": "mediclinic",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Mediclinic",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "302141",
"name": "Cisco",
"url": "https://staging.dailymaverick.co.za/keyword/cisco/",
"slug": "cisco",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cisco",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "360184",
"name": "data breaches",
"url": "https://staging.dailymaverick.co.za/keyword/data-breaches/",
"slug": "data-breaches",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "data breaches",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "402661",
"name": "Yeshiel Panchia",
"url": "https://staging.dailymaverick.co.za/keyword/yeshiel-panchia/",
"slug": "yeshiel-panchia",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Yeshiel Panchia",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "434702",
"name": "CheckPoint",
"url": "https://staging.dailymaverick.co.za/keyword/checkpoint/",
"slug": "checkpoint",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "CheckPoint",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "11986",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/Pqa0ao5lgBCWpbD-IwNAG-DZLoI=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/m_VWSD431aDP7ja4EGzwuQi8BQA=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/Q9bwSw5C5hQ2qBetYZ7H8btM9Rk=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/xiOD572t4HWr2ND1xLXD3zKgx48=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/fscTUWnrPCa6ZzOS-qeNcZ_JsRg=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/Pqa0ao5lgBCWpbD-IwNAG-DZLoI=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/m_VWSD431aDP7ja4EGzwuQi8BQA=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/Q9bwSw5C5hQ2qBetYZ7H8btM9Rk=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/xiOD572t4HWr2ND1xLXD3zKgx48=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/fscTUWnrPCa6ZzOS-qeNcZ_JsRg=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/10/iStock-1455658894.jpg",
"type": "image"
}
],
"summary": "South Africa is becoming globally notorious in a field that should really be avoided: cybersecurity failure. A recent report from Virtual Private Network provider Surfshark shows that South Africa ranks second on the continent for data breaches. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Data breaches and cyber vulnerabilities - SA's troubling lack of readiness revealed",
"search_description": "<span style=\"font-weight: 400;\">Simultaneously, </span><a href=\"https://hooklineandsinker.sharepoint.com/:b:/s/HookLineSinker/EdMLaP8e5qFFnumE5eGbslIB3Lym1P-O5np9xUy2Kw50Yw?e=2ZmGXi\"><span style=\"font",
"social_title": "Data breaches and cyber vulnerabilities - SA's troubling lack of readiness revealed",
"social_description": "<span style=\"font-weight: 400;\">Simultaneously, </span><a href=\"https://hooklineandsinker.sharepoint.com/:b:/s/HookLineSinker/EdMLaP8e5qFFnumE5eGbslIB3Lym1P-O5np9xUy2Kw50Yw?e=2ZmGXi\"><span style=\"font",
"social_image": ""
},
"cached": true,
"access_allowed": true
}