By Christopher Tredger, Portals editor, Johannesburg, 29 Jan 2024

Jenny Jooste, client manager for cyber and professional indemnity technology at Aon South Africa.
Consulting firm Aon warns that e-mail interception fraud is on the rise in South Africa. Cyber criminals leveraging advanced technology tools gain unauthorised access.
According to Aon’s first Cyber Risk Survey for South Africa, 22% of participating companies have suffered a cyber incident in the past five years, and the majority (67%) have deployed a cyber risk management tool.
The study aimed to identify current trends in cyber risk governance practices being deployed in South African companies.
Aon notes that, in addition to phishing, social engineering and business e-mail compromise attacks, fraudsters also launch man-in-the-middle attacks, in which communication between two parties on public WiFi networks or compromised routers is intercepted, allowing the capture of sensitive information.
Jenny Jooste, client manager for cyber and professional indemnity technology at Aon South Africa, says although there are no statistics available to quantify the size of the problem, e-mail interception fraud has become more prevalent over the last two years.
She adds that phishing e-mails and social engineering are the most common methods of infiltrating e-mails. “The reason being people believe that what they see on social media is 100% authentic and that IT controls will block spam and phishing e-mails. The reality is that people go on to unsecured WiFi and internet sites believing they are secure.”
User behaviour and a false sense of security remain challenges. As an example, Aon South Africa says some SMEs and mid-sized companies are under the impression their profiles are not high enough to warrant an attack.
“The reality is companies employ staff on a full-time basis just to access any company system and demand a ransom demand/ or intercept e-mails,” says Jooste. “They call it the “shotgun” approach – when a spam e-mail is sent to a listed SME – the first one to click on the link could potentially affect a large multimillion/billion organisation or the engineering firm with ten staff based in Bloemfontein.”
Aon advises that internal and external teams that perform penetration testing should highlight areas of concern and implement a road map and timeline together of the most important /crucial items that need to be fixed, adjusted, or changed (additional mitigating controls).
Aon recommends that both internal and external teams perform penetration testing to identify areas of concern. These teams should work together to establish a roadmap and timeline for addressing the most critical issues, prescribing necessary fixes and adjustments, including the implementation of additional mitigating controls.
The days of no budget available for proactive IT security are over, Jooste adds. “Without data and connectivity, you have no business. ”Provided by SyndiGate Media Inc. (Syndigate.info).
Your expertise really shines through in this article. The practical tips and insights you’ve shared are going to be very useful for my work.
I intended to write you that little word in order to give many thanks as before for those marvelous opinions you’ve featured at this time. It has been really particularly generous of you to allow publicly all that a lot of people would have distributed as an e-book in order to make some bucks on their own, even more so considering the fact that you could have tried it in case you wanted. These advice additionally acted like a easy way to be aware that other people have a similar interest just as mine to find out more on the topic of this matter. I know there are lots of more pleasant times up front for folks who see your blog post.
My husband and i felt now satisfied that Albert managed to do his reports through the entire precious recommendations he made from your very own web pages. It is now and again perplexing just to choose to be handing out information and facts some people have been making money from. Therefore we see we’ve got the writer to thank for this. All the explanations you have made, the straightforward site navigation, the friendships you can help to foster – it is most wonderful, and it’s making our son and the family reason why that subject is cool, which is certainly quite serious. Thanks for everything!
This web site is really a walk-through for all of the info you wanted about this and didn’t know who to ask. Glimpse here, and you’ll definitely discover it.
After study a few of the blog posts on your website now, and I truly like your way of blogging. I bookmarked it to my bookmark website list and will be checking back soon. Pls check out my web site as well and let me know what you think.
har også bogmærket dig for at se på nye ting på din blog Hej! Har du noget imod, hvis jeg deler din blog med min facebook
Conhecem algum método para ajudar a evitar que o conteúdo seja roubado? Agradecia imenso.
fortsæt med at guide andre. Jeg var meget glad for at afdække dette websted. Jeg er nødt til at takke dig for din tid
že spousta z něj se objevuje na internetu bez mého souhlasu.
الاستمرار في توجيه الآخرين.|Ahoj, věřím, že je to vynikající blog. Narazil jsem na něj;
webové stránky jsou opravdu pozoruhodné pro lidi zkušenosti, dobře,
I do enjoy the way you have presented this specific situation plus it really does offer us a lot of fodder for thought. Nonetheless, through just what I have observed, I only trust as the actual commentary stack on that people stay on point and in no way start upon a tirade associated with some other news of the day. Still, thank you for this excellent piece and although I can not really go along with the idea in totality, I respect the perspective.
muito dele está a aparecer em toda a Internet sem o meu acordo.
I got good info from your blog
Com tanto conteúdo e artigos, alguma vez se deparou com problemas de plágio ou violação de direitos de autor? O meu site tem muito conteúdo exclusivo que eu próprio criei ou
Esta página tem definitivamente toda a informação que eu queria sobre este assunto e não sabia a quem perguntar. Este é o meu primeiro comentário aqui, então eu só queria dar um rápido
devido a esta maravilhosa leitura!!! O que é que eu acho?
Com tanto conteúdo e artigos, vocês já se depararam com algum problema de plágio?
vykřiknout a říct, že mě opravdu baví číst vaše příspěvky na blogu.
devido a esta maravilhosa leitura!!! O que é que eu acho?
Com tanto conteúdo e artigos, alguma vez se deparou com problemas de plágio ou violação de direitos de autor? O meu site tem muito conteúdo exclusivo que eu próprio criei ou
Obrigado|Olá a todos, os conteúdos existentes nesta
také jsem si vás poznamenal, abych se podíval na nové věci na vašem blogu.|Hej! Vadilo by vám, kdybych sdílel váš blog s mým facebookem.
for the reason that here every material is quality based
|Hello to all, for the reason that I am actually keen of
skupině? Je tu spousta lidí, o kterých si myslím, že by se opravdu
på grund af denne vidunderlige læsning !!! Jeg kunne bestemt virkelig godt lide hver eneste lille smule af det, og jeg
Spot on with this write-up, I actually assume this web site needs far more consideration. I’ll most likely be once more to read rather more, thanks for that info.
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
Generally I do not read article on blogs, but I wish to say that this write-up very forced me to try and do it! Your writing style has been surprised me. Thanks, quite great post.
It means so much to receive positive feedback and know that my content is appreciated. I strive to bring new ideas and insights to my readers.
Ultimately, Sass could be motivated to put down the blush brush and eyeliner and embrace a brand new profession-one that went deeper than liquid basis and ending powder.
I like this weblog its a master peace ! Glad I discovered this on google .