Page 63 - 2022 IRMSA Risk Report
P. 63
South Africa Top Risks
SECTION 3: South Africa Top Risks continued
The biggest culprits to interruptions are: /
i iÜ ÞLiÀ Àià čVÌ V`wià VÞLiÀVÀià >`
• Cyber security breaches: As technology imposes heavy penalties for offences. The Act should
becomes more pervasive and the `iÌiÀ VÞLiÀ VÀ>Ã >` i«ÜiÀ >Ü vwV>Ã Ì ÃÜvÌÞ
VÃÌ v V«ÕÌ} `iViÃ] Ì
iÀi respond to cybercrimes. This will also bolster investor
à > VÀi>Ãi
}
Þ À}>Ãi`] Vw`iVi >` VÃÕiÀ ÌÀÕÃ̰
sponsored and sophisticated cyber-attacks. Organisations must also adopt a pragmatic risk-based
/
iÃi č`Û>Vi` *iÀÃÃÌiÌ /
Ài>ÌÃ VÌÕi >««À>V
] vÀi` LÞ > ÃiÀÛVi VÀÌV>ÌÞ vÀ>iÜÀ]
to be a major cause of outages and methods which must contain key indicators (e.g. type of
v >ÌÌ>V VÕ`i À>ÃÜ>Ài] «
Ã
} >`] `>Ì>] ÀiÛiÕi «>VÌ] VÕÃÌiÀ «>VÌ] Ài}Õ>ÌÀÞ
VÀi>Ã}Þ] V }° "Ì
iÀ VÞLiÀ ÃiVÕÀÌÞ ÀiµÕÀiiÌÃ] >` Ì
i ëii` v «>VÌ®°
threats that are compromising digital services The outcomes must be used to inform business resiliency
include Shadow IT within organisations and «>}° >``Ì] À}>Ã>ÌÃ ÕÃÌ Õ`iÀÃÌ>` Ì
i
security threats from 3rd parties.
ÌiÀViVÌi`iÃÃ v Ì
iÀ ÃiÀÛViÃ] VÕ`} Ü
Ì
iÀ
• Connectivity outages: Infrastructure underpins service providers are. Security control assurance must be
Ài>Li `}Ì> ÃiÀÛVið >À VÌÀLÕÌÀà iÝÌi`i` Ì Ì
à Ü`iÀ iÌÜÀ°
Ài> >`Ã
i``}] ÌiÀiÌ ÕÌ>}ià >` >ÃÌÞ] > `iLiÀ>Ìi vVÕà `iÛi«iÌ v
Õ>
quality degradation. Services outages are V>«Ì> Ì `i> ÜÌ
`}Ì> ÀÃÃ Ã iÞ i°}° ÃiVÕÀÌÞ]
compounded by the concentration of a few «À}À>}] >`Û>Vi` iÌÜÀ}®° /
à ÕÃÌ Li
>À}i ¼ÛÃLi½ ÌiÀi`>Àià Ì
>Ì «ÀÛ`i accompanied by strong retention programmes to ensure
most internet services. These platform talent stays within organisation and the continent.
«ÀÛ`iÀÃ] VÃÌ i>`iÀÃ `Õi Ì
iÀ ÃV>i] >Ài
increasingly becoming the internet’s biggest À čvÀV>] Ì
i `}Ì> ÀiÛÕÌ «ÀiÃiÌÃ >Þ
threat. ««ÀÌÕÌiÃ] LÕÌ Ì Ã Þ À}>Ã>ÌÃ Ì
>Ì >Ài ÃiVÕÀi
and resilient by design that will have the advantage and
U *i«i v>VÌÀÃ\ iëÌi Ì
i VÀi>Ãi` thrive in a digital world.
introduction of technologies such as robotics
>` >ÕÌ>Ì] ÃÌ ÕÌ>}ià >Ài `Õi Ì
Õ> iÀÀÀð ÃVw}ÕÀ>Ìà Ài> Ì
i
i>`} V>ÕÃi] LÕÌ >V v ÃÃ] >V v VÞLiÀ
threat awareness and keyman risk as a result of
poor knowledge management also contributes.
Government accelerates digital adoption by
promoting favourable policies and increasing
investment in infrastructure to ensure that more
people are connected. But this alone will not
be enough. Simply being connected will not
}Õ>À>Ìii µÕ>ÌÞ À Ài>Li ÃiÀÛVið ->ÀÞ]
Ã`ÀiVÌi` >À}i ëi` Ì ¼ÃiVÕÀÌÞ½ ÃÕÌà Ü
not guarantee better results. Building a successful
and sustainable digital economy requires a sound
policy framework.
" > «ÃÌÛi Ìi] Ì
i iÜ ÌiiÃ
communicated by the ICASA regarding the
allocation of spectrum shows promise that
infrastructure development will soon be unlocked
>` i>Li Ì
i À ÕÌ v
}
ëii`]
}
capacity 5G networks that are crucial for providing
advanced digital services and further reducing the
costs of access.
IRMSA RISK REPORT • SOUTH AFRICA RISKS • EIGHTH EDITION 61