Cybersecurity strategy: future proof cybersecurity for small to medium enterprises in South Africa

Author:

Mugwagwa AudeciousORCID,Bhero ErnestORCID,Chibaya ColinORCID

Abstract

Technological development has witnessed tremendous and an increase in business interactions as they execute their daily business. Information technology and broadband are significant drivers of productivity and efficiency growth for small firms as they expand their market. This development has raised growing concerns as it relates to data and information security, infrastructure, and related resources  due to an increase in cybersecurity hazards faced  by Small to Medium Enterprises globally. In South Africa, although, during the first four months of 2022, cyber-attacks decreased by 13% to account for 419506 internet attacks, this statistic remains high enough for concern. To counter escalating cybersecurity risks, organizations must have a cybersecurity strategy to safeguard their operations, clients, data, and infrastructure. The threat landscape is changing over time, and despite ongoing attempts to strengthen security, they don't appear to be enough to prevent evolving cyberattacks. The study aims to identify cybersecurity threats facing Small to Medium Enterprises in South Africa by reviewing the literature and identifying key Cybersecurity challenges. It also examines the strategies, resources, and techniques used in South Africa to reduce cybersecurity threats. Lastly, the paper recommends adopting a comprehensive Cybersecurity strategy to build future-proof cybersecurity for Small to Medium Enterprises in South Africa.

Publisher

Center for Strategic Studies in Business and Finance SSBFNET

Reference31 articles.

1. Abomhara, M., & Køien, G. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, pp. 65-88.

2. Awasthi, S. (2022). Half of SMEs admit they do not provide cyber security training, despite nearly two thirds reporting an increase in cyber security threats over the last 2 years. Retrieved from https://www.fenews.co.uk/edtech/62-of-executive-managers-in-smes-have-experienced-an-increase-in-cyber-security-threats-in-the-last-2-years/.

3. Azmi, R., Tibben, W. J., & Win, K. T. (2018). Review of cybersecurity frameworks: context and shared concepts. Research online.

4. Bada, M., Sasse, A., & Nurse, J. (2019). Cyber security awareness campaigns: why do they fail to change behaviour? arXiv:190102672 Cs.

5. Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Elsevier. Government Information Quarterly.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A model on workarounds and information security integrity;South African Journal of Information Management;2024-08-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3