back to top
24.9 C
Johannesburg
spot_imgspot_img
More
    spot_img

    Date:

    Share:

    5 essential cybersecurity measures for SMEs in the cloud age

    South Africa’s small and medium enterprises (SMEs) have embraced cloud services to take advantage of scalable subscription services that enable hybrid working models, allow them to turn IT from a capital cost into operational expenditure, and achieve higher levels of flexibility. However, despite the many benefits of cloud computing, it also brings new complexities to cybersecurity.

    The public cloud services and applications SMEs source from providers like Microsoft, AWS and Google are hosted in secure data centres. But end-user devices used to access these services—such as PCs and smartphones remain vulnerable to a range of threats—including malware, insider data theft, ransomware and elaborate social engineering threats.

    Global research from Sage found that half of SMBs have experienced a cyber security incident in the past year and a quarter have experienced more than one. A Sophos study meanwhile found that South Africa had the biggest increase in ransomware attack rates, with 78% of organisations hit in the 2023 survey compared to 51% in 2022.

    The risks of cyberattacks and data breaches are significant. Sophos found there was a direct revenue loss to 82% of private sector organisations in South Africa that experienced ransomware attacks. There are also possible regulatory repercussions, with regulations under the Protection of Personal Information Act providing for stringent fines and penalties for non-compliant companies. This is without mentioning the impact on customer relationships, possible legal liabilities, and the business costs of losing business-critical data.

    With SMEs on cybercriminals’ radar, it has become more important than ever to fortify their data and systems. Here are a few ways that your SME can strengthen its cybersecurity defences:

    1. Consider moving towards a zero-trust model

    SMEs can benefit from embracing a Zero Trust security model, a framework that operates on the principle of “never trust, always verify”. In practice, this means that your business will not automatically trust any person, device, or system inside or outside your network. Everyone and every device will need to authenticate before gaining access to data or systems. Many cloud services such as Microsoft 365 Business support Zero Trust principles—provided they are configured correctly.

    1. Remember your devices are your weak point

    The physical theft or loss of a smartphone or notebook with privileged access to cloud services and apps is one of your biggest risks. In the Sage research, the most mentioned cybersecurity incident was stolen laptops (28%). Make sure your end-users protect their devices from unauthorised access with biometric authentication (facial recognition or fingerprints) or strong passwords. Use the ‘Find My PC/Phone/Tablet’ feature to improve the chances of recovering a lost or stolen device.  

    1. Introduce regular security training

    Data breaches or malware attacks can be the result of human error. Sophisticated cybercriminals gain access to your systems or data through social engineering techniques that exploit employees’ fear, ignorance, or negligence. It’s thus imperative to regularly train employees in cloud security risks and best practices. Educating users about phishing scams, data privacy, and secure cloud usage goes a long way in mitigating the risk of human error leading to security incidents.

    1. Implement multifactor authentication

    Most data breaches occur because of a cybercriminal getting their hands on user credentials to access systems via the cloud. The majority of these attacks can be stopped with multi-factor authentication (MFA). With MFA, users use a one-time password or PIN emailed or texted to them when they want to access a system. Or they could use an app like Google Authenticator or a hardware token to generate a code.

    1. Plan for the worst

    Prepare yourself to bounce back quickly if the worst happens. Ensure that you regularly back up anydata you store in the cloud or on local devices. Best practice is to create three copies—two onsite, one offsite—to ensure the business can recover from an attack. Also develop and regularly test an incident response plan specific to cloud security incidents. This plan should outline steps for identifying, containing, and mitigating the impact of security breaches in the cloud environment.

    spot_img
    spot_img

    ━ More like this

    Kaspersky Next updates its all-in-one SOC management console and enhances AI functionality

    These advancements facilitate the administration and maintenance of security tasks on a platform, and allow for advanced AI capabilities, enhancing various processes from faster...

    Defending as a team: Kaspersky works with INTERPOL to secure Africa Cup of Nations

    As part of INTERPOL’s Project Stadia, Kaspersky cooperated with INTERPOL to ensure the cybersecurity of the Africa Cup of Nations (AFCON) football tournament, which concluded...

    The number of Trojan banker attacks on smartphones increased by 56% in 2025

    According to a Kaspersky report “Mobile malware evolution,” the number of Trojan banker attacks on Android smartphones increased by 56% in 2025 compared to...

    NETSCOUT reveals qualitative shifts in DDoS attack sophistication, infrastructure capacity, and threat actor capabilities

    NETSCOUT® SYSTEMS, INC. (NASDAQ: NTCT), today released its second half of the year 2025 Distributed Denial-of-Service (DDoS) Threat Intelligence Report, revealing sophisticated attacker collaboration,...

    Kaspersky enhances its security awareness platform with SCORM and PDF support

    Kaspersky has introduced an update to its Automated Security Awareness Platform, adding full support for PDF and SCORM (Sharable Content Object Reference Model) –...
    spot_img