All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1793035",
"signature": "Article:1793035",
"url": "https://staging.dailymaverick.co.za/article/2023-08-03-cyberattacks-in-sa-integrated-plan-needed-to-protect-critical-infrastructure/",
"shorturl": "https://staging.dailymaverick.co.za/article/1793035",
"slug": "cyberattacks-in-sa-integrated-plan-needed-to-protect-critical-infrastructure",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 1,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Cyberattacks – South Africa needs an integrated approach to protect critical infrastructure",
"firstPublished": "2023-08-03 21:36:48",
"lastUpdate": "2023-08-03 21:36:48",
"categories": [
{
"id": "405817",
"name": "Op-eds",
"signature": "Category:405817",
"slug": "op-eds",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/op-eds/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6972,
"contents": "<span style=\"font-weight: 400;\">Over the past few years, organisations have seen accelerated waves of digitisation, digitalisation and digital transformation. State-owned and run organisations, many of which are in charge of critical infrastructure, are no exception.</span>\r\n\r\n<span style=\"font-weight: 400;\">While this rapid adoption of digital technologies has been crucial to operational efficiency and, ultimately, service delivery, it has also opened up new entry points for cybercriminals. </span>\r\n\r\n<span style=\"font-weight: 400;\">The attack surface has increased, while the attacks by cybercriminals have grown in frequency, strength and severity. They’re also increasingly targeting critical infrastructure, including healthcare systems, utilities and ports. </span>\r\n\r\n<span style=\"font-weight: 400;\">And while South Africa has yet to experience a truly devastating attack, it’s certainly not immune to one. If the country is to protect its critical infrastructure (some of which is already in a vulnerable state), it needs an integrated approach that brings together various arms of the state and uses the latest tactics in both attack prevention and response. </span>\r\n<h4><b>A growing global problem </b></h4>\r\n<span style=\"font-weight: 400;\">Cyberattacks targeting infrastructure have become increasingly commonplace. Just within the past few years, several major global powers have seen incredibly disruptive attacks on their critical infrastructure.</span>\r\n\r\n<span style=\"font-weight: 400;\">In 2021, for example, an attack on the US’s Colonial Pipeline (which carries petrol and jet fuel to much of the southeastern US) caused it to shut down for several days. The impact of the shutdown was so great that President Joe Biden declared a state of emergency, suspending the limits on how much petroleum could be transported by road and rail. </span>\r\n\r\n<span style=\"font-weight: 400;\">In the UK, an IT supplier to the National Health Service fell victim to a </span><a href=\"https://www.theguardian.com/technology/2022/aug/11/nhs-ransomware-attack-what-happened-and-how-bad-is-it\"><span style=\"font-weight: 400;\">ransomware attack</span></a><span style=\"font-weight: 400;\"> in 2022. As a result, several important functions – including patient referrals, ambulance dispatch, out-of-hours appointment bookings, mental health services and emergency prescriptions – were affected. </span>\r\n\r\n<span style=\"font-weight: 400;\">Even smaller players on the world map aren’t immune to such attacks. In mid-2022, for instance, </span><a href=\"https://www.dailymaverick.co.za/article/2022-08-18-estonia-says-it-repelled-major-cyber-attack-after-removing-soviet-monuments/\"><span style=\"font-weight: 400;\">Estonia</span></a><span style=\"font-weight: 400;\"> experienced its most intense cyberattack since 2007. And in May 2022, a ransomware gang infiltrated Costa Rican government systems. </span>\r\n<blockquote>Education is critical – 95% of cybersecurity issues can be traced to human error.</blockquote>\r\n<span style=\"font-weight: 400;\">Experts agree that in the case of South Africa, as with most countries, it is only a matter of time before the country experiences a highly disruptive attack. </span>\r\n\r\n<span style=\"font-weight: 400;\">In fact, there have already been a number of cyberattacks on our shores. For example, a </span><a href=\"https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-identifies-top-cyberthreats-in-Africa\"><span style=\"font-weight: 400;\">recent report by Interpol</span></a><span style=\"font-weight: 400;\"> indicated that 34% of business email compromise events recorded in Africa were in South Africa. </span>\r\n<h4><b>Integrated defences </b></h4>\r\n<span style=\"font-weight: 400;\">But what can the state and private sector players charged with running and maintaining critical infrastructure do to ensure that it’s kept as safe as possible? While there are no simple answers, an integrated approach is key. </span>\r\n\r\n<span style=\"font-weight: 400;\">That starts with policy. If the government provides clear direction and makes it clear that cybersecurity is a countrywide responsibility, rather than something to be handled by a single department, everyone is much more likely to move in the same direction. Here, South Africa has already laid a decent foundation. </span>\r\n\r\n<span style=\"font-weight: 400;\">The </span><a href=\"http://www.gov.za/sites/www.gov.za/files/39475_gon609.pdf\"><span style=\"font-weight: 400;\">National Cybersecurity Policy Framework</span></a><span style=\"font-weight: 400;\">, for instance, has been in place since 2015. Led by the Ministry of State Security, its aim is to provide a holistic approach to the promotion of cybersecurity measures by players across South Africa. It is supported by the National Cybersecurity Implementation Plan, which lays out roles and responsibilities, timeframes, specific performance indicators and monitoring and evaluation mechanisms.</span>\r\n\r\n<span style=\"font-weight: 400;\">With those frameworks in place, education becomes critical – </span><a href=\"https://www.marshmclennan.com/content/dam/mmc-web/insights/publications/2022/global-risks-report-2022/global-risks-report-2022.pdf#page=45\"><span style=\"font-weight: 400;\">95% of cybersecurity</span></a><span style=\"font-weight: 400;\"> issues can be traced to human error. Social engineering and phishing attacks, in particular, are powerful tactics for cybercriminals and are used in the vast majority of cyberattacks.</span>\r\n\r\n<span style=\"font-weight: 400;\">Unless people working at all levels across an organisation know what attachments not to open and which links not to click on, there’s likely to be exposure. </span>\r\n\r\n<b>Read more in Daily Maverick: </b><a href=\"https://www.dailymaverick.co.za/article/2023-04-04-catastrophic-global-cyber-event-predicted-as-sa-government-faces-increasing-attacks-experts/\"><span style=\"font-weight: 400;\">Catastrophic global cyber event predicted as SA government faces increasing attacks — experts</span></a>\r\n\r\n<span style=\"font-weight: 400;\">Beyond that, it’s also important to ensure that the relevant cybersecurity skills are developed and retained, particularly within organisations dealing with critical infrastructure. Here too there is work to be done. Research </span><a href=\"https://www.fortinet.com/content/dam/fortinet/assets/reports/2023-cybersecurity-skills-gap-report.pdf?utm_source=website&utm_medium=pr&utm_campaign=cybersecurity-skills-gap-2023\"><span style=\"font-weight: 400;\">released by Fortinet in 2023</span></a><span style=\"font-weight: 400;\"> found that 40% of South African companies struggle to hire and retain cybersecurity talent. And 86% said they had experienced more than one cyberattack that could be at least partially attributed to a lack of cybersecurity skills over the past 12 months. </span>\r\n\r\n<span style=\"font-weight: 400;\">Another area where integration is particularly important is intelligence. If state departments, organisations and those in the private sector are able to seamlessly share intelligence around the kinds of threats they face, then building proper defences becomes much easier. </span>\r\n<h4><b>Preparing for the worst </b></h4>\r\n<span style=\"font-weight: 400;\">Of course, in a world where cyberattacks should be viewed as a matter of “when, not if”, an integrated response plan is also needed. In the event of a successful cyberattack, organisations need to be able to respond quickly and in a way that gets any affected critical infrastructure back up and running as quickly as possible. </span>\r\n\r\n<b>Read more in Daily Maverick: </b><a href=\"https://www.dailymaverick.co.za/article/2022-09-26-five-things-south-africa-must-do-to-combat-cybercrime/\"><span style=\"font-weight: 400;\">Five things South Africa must do to combat cybercrime</span></a>\r\n\r\n<span style=\"font-weight: 400;\">That response plan should clearly lay out key roles and responsibilities for a team drawn from departments across the organisation. That team should also be well drilled in dealing with different event scenarios. Additionally, it should cover everything from how attacks that have been successful are investigated, how vulnerabilities are patched up and how the attack should be communicated to stakeholders. </span>\r\n\r\n<span style=\"font-weight: 400;\">While each organisation will have its own specific response plan requirements, it’s still possible for a broad cross-section of organisations to take an integrated approach and adopt similar best practices. </span>\r\n<h4><b>Taking on a constant, growing threat </b></h4>\r\n<span style=\"font-weight: 400;\">Ultimately, cyberattacks are unlikely to decrease in frequency or ferocity in the near future. And in a fraught global sociopolitical and economic environment, attacks on critical infrastructure are only likely to grow in strength and sophistication. South Africa needs to be aware of that and plan accordingly. </span>\r\n\r\n<span style=\"font-weight: 400;\">While an integrated approach won’t stop every attack, it will prevent many more than allowing organisations in charge of critical infrastructure to each take care of their own cybersecurity needs. Moreover, such an approach can also help mitigate the impact of any such attack. </span>\r\n\r\n<span style=\"font-weight: 400;\">Right now, South Africa has the right building blocks in place for a fully integrated approach, but it should also be clear about the fact that there’s more to be done. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Adius Ncube is a partner in the Public Sector Practice in Johannesburg at management consultancy Oliver Wyman.</span></i>",
"teaser": "Cyberattacks – South Africa needs an integrated approach to protect critical infrastructure",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "556731",
"name": "Adius Ncube",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/adius-ncube/",
"editorialName": "adius-ncube",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12438",
"name": "Cyberattacks",
"url": "https://staging.dailymaverick.co.za/keyword/cyberattacks/",
"slug": "cyberattacks",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberattacks",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12440",
"name": "Ransomware",
"url": "https://staging.dailymaverick.co.za/keyword/ransomware/",
"slug": "ransomware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ransomware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12442",
"name": "National Health Service",
"url": "https://staging.dailymaverick.co.za/keyword/national-health-service/",
"slug": "national-health-service",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "National Health Service",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "19061",
"name": "Joe Biden",
"url": "https://staging.dailymaverick.co.za/keyword/joe-biden/",
"slug": "joe-biden",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Joe Biden",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "61098",
"name": "Interpol",
"url": "https://staging.dailymaverick.co.za/keyword/interpol/",
"slug": "interpol",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Interpol",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "244418",
"name": "NHS",
"url": "https://staging.dailymaverick.co.za/keyword/nhs/",
"slug": "nhs",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "NHS",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "406549",
"name": "Adius Ncube",
"url": "https://staging.dailymaverick.co.za/keyword/adius-ncube/",
"slug": "adius-ncube",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Adius Ncube",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "406550",
"name": "US Colonial Pipeline",
"url": "https://staging.dailymaverick.co.za/keyword/us-colonial-pipeline/",
"slug": "us-colonial-pipeline",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "US Colonial Pipeline",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "406551",
"name": "National Cybersecurity Policy Framework",
"url": "https://staging.dailymaverick.co.za/keyword/national-cybersecurity-policy-framework/",
"slug": "national-cybersecurity-policy-framework",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "National Cybersecurity Policy Framework",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "16880",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/FUpkr8Bi9Z4I6EJArEttz7nBpI0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ghNAfsz999Hh1OdMvEDL6sDaGGY=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/RAtOlPhAIA4QOdOcUp0dQfdQgf8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/EzsBaRquVINlxZBGae96PwYCVE4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/xlkr-d12Y1DoFur_gwcJ7rBYC-0=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/FUpkr8Bi9Z4I6EJArEttz7nBpI0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/ghNAfsz999Hh1OdMvEDL6sDaGGY=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/RAtOlPhAIA4QOdOcUp0dQfdQgf8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/EzsBaRquVINlxZBGae96PwYCVE4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/xlkr-d12Y1DoFur_gwcJ7rBYC-0=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/08/iStock-1386184656.jpg",
"type": "image"
}
],
"summary": "If the country is to protect its critical infrastructure, some of which is already in a vulnerable state, it needs an integrated approach that brings together various arms of the state and uses the latest tactics in both attack prevention and response. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Cyberattacks – South Africa needs an integrated approach to protect critical infrastructure",
"search_description": "<span style=\"font-weight: 400;\">Over the past few years, organisations have seen accelerated waves of digitisation, digitalisation and digital transformation. State-owned and run organisations, many o",
"social_title": "Cyberattacks – South Africa needs an integrated approach to protect critical infrastructure",
"social_description": "<span style=\"font-weight: 400;\">Over the past few years, organisations have seen accelerated waves of digitisation, digitalisation and digital transformation. State-owned and run organisations, many o",
"social_image": ""
},
"cached": true,
"access_allowed": true
}