Techsoma Homepage
  • Home
  • Africa’s Innovation Frontier
  • African FutureTech
  • Investor Hotspots
  • Reports
  • Home
  • Africa’s Innovation Frontier
  • African FutureTech
  • Investor Hotspots
  • Reports
Home Cybersecurity

Cybersecurity Strategies: Inside-Out Protection for Modern Businesses

by Faith Amonimo
October 23, 2025
in Cybersecurity, Event Radar Africa
Reading Time: 4 mins read
Cybersecurity Strategies: Inside-Out Protection for Modern Businesses

The password “admin123” seemed harmless enough until hackers used it to infiltrate an entire corporate network, stealing customer data and shutting down operations for days.

This real case, shared at South Africa’s 2025 IT Indaba, shows how human mistakes continue to create massive security holes even as companies spend millions on advanced cybersecurity tools. New research reveals that human errors cause 68% of all data breaches in 2024, with manual processes still dominating critical security tasks.

Security Teams Build Walls While Employees Leave Doors Open

Companies treat security like building a fortress. They install expensive firewalls, hire security experts, and buy the latest threat detection software. But they forget that employees hold the keys to the kingdom.

“Our analysts and developers assume that every new feature, every API we deploy and every line of code we write could and most probably will be targeted in an attack. If you have that mindset, it changes everything”, said Jan-Jurgens van der Walt, business unit head of technology at iOCO, during his presentation on security-first development practices.

His team embeds security specialists into every project from day one. They don’t add security at the end like most companies do. They bake it into the foundation.

Johan van Dyk, executive head of forensic services at XTND, sees the aftermath when companies take shortcuts. The printer attack happened because someone never changed the default login credentials. Basic human oversight created a billion-rand security disaster.

Manual Security Processes Create Predictable Failures

Recent data from Cerby’s 2025 Identity Automation Gap report exposes alarming gaps in how companies handle basic security tasks:

  • 41% of employees still share passwords through spreadsheets and email
  • 89% of companies rely on workers to manually turn on multi-factor authentication
  • 59% of IT teams manually add and remove user access rights

These manual processes fail because humans forget, make mistakes, or skip steps when rushed. Companies that experienced security breaches from manual identity work lost customers (43%) and business partners (36%) as direct consequences.

Neil van Wyngaard, solutions architect at iOCO, argues that automation removes these human failure points entirely. “If the process of giving people access to resources was automated, you can prevent people from having access to systems they are not supposed to have access to,” he explained during the IT Indaba session.

Voice Technology Catches Dishonest Employees Before They Start

Traditional background checks miss a crucial element which is honesty. Van Dyk’s forensic team now uses voice technology to test integrity before hiring people for security-sensitive roles.

“In our business, we make use of voice technology, which is not intrusive at all. It can be done by telephone, it is not language dependent, and it helps us test honesty before we employ or appoint people,” van Dyk revealed.

The technology analyzes speech patterns to detect deception without requiring face-to-face meetings or specific languages. Several cybersecurity partners now use this approach to verify their staff members actually follow security protocols.

Voice testing addresses a growing concern that insider threats account for 23% of cybersecurity breaches in financial services alone, according to industry statistics.

Security Automation Reduces Errors, But Faces Trust Issues

Automation prevents the memory lapses and shortcuts that create security gaps. Van Wyngaard demonstrated how automated systems continuously monitor access rights and immediately flag unusual activity.

“If the security becomes invisible, sitting behind the scenes while automation maintains it, people don’t mind because they don’t have to do it. The moment it becomes a chore, they avoid it or make mistakes,” he noted.

However, artificial intelligence adoption in security faces resistance. While 78% of security leaders don’t trust AI to fully automate core identity tasks, 45% support collaborative approaches where humans oversee AI decisions.

Companies successfully using automation report dramatic improvements. Van Dyk’s firm maintained the same 75-person workforce over three years while dramatically increasing productivity through AI and process automation. No employees lost jobs; instead, they learned to work alongside automated tools.

Business Leaders Must Champion Security Culture

Technical solutions fail without leadership support. Van der Walt emphasized that embedding security requires both clear governance and daily habits reinforced by executives.

“Security should not be about adding a gate. It should be about creating secure habits and making them part of your delivery process,” he stated.

Teams that integrate security reviews into every development phase and discuss security incident lessons create lasting cultural change. This approach transforms security from a compliance checkbox into a competitive advantage.

Companies treating security as an afterthought face predictable consequences. The Ponemon Institute found that 52% of enterprises experienced security breaches caused by manual identity management processes.

AI Security Requires Careful Data Separation

As companies adopt AI tools, new vulnerabilities emerge. Van Wyngaard warned against storing sensitive information directly in large language models.

“You can’t put sensitive information into the model. Keep it in a database, expose it via an API, and use two AI layers. One determines the intent, the other verifies the user before retrieving data. That way, you can’t hack the AI,” he advised.

This approach separates generic AI capabilities from confidential business data, preventing attackers from accessing sensitive information even if they compromise the AI system.

The combination of secure development practices, automated processes, and strong leadership support creates resilient security programs. Companies that master this inside-out approach transform their biggest vulnerability, which is human behaviour, into their strongest defense.

ADVERTISEMENT
Faith Amonimo

Faith Amonimo

Moyo Faith Amonimo is a Writer and Content Editor at Techsoma, covering tech stories and insights across Africa, the Middle...

Recommended For You

Google Empowers AI Growth in Africa with $37 Million initiative
Cybersecurity

Google and CyberSafe Foundation Unveil Resilio Africa

by Kingsley Okeke
December 12, 2025

Google.org and the CyberSafe Foundation have formally introduced Resilio Africa, a large-scale cybersecurity resilience initiative designed to strengthen the digital defences of community-facing institutions across Sub-Saharan Africa. Announced in December...

Read moreDetails
Over 5,000 Leaders to Converge in Lagos for Tech Revolution Africa 2026

Over 5,000 Leaders to Converge in Lagos for Tech Revolution Africa 2026

December 11, 2025
Wole Ayodele CEO of Fincra discussing cross-border payments in Africa

Fincra Announced as Headline Supporter of Africa Tech Summit Nairobi 2026 to Drive Dialogue on Building the Rails for an Integrated Africa

December 11, 2025
MediLoan by MyItura

19 Million Insured, 200 Million Exposed: The Gap MediLoan by MyItura is Built to Fill

December 10, 2025
Panelists from CcHUB and Data Science Nigeria discussing health financing at the MyItura event.

Beyond Credit Scores: How MediLoan by MyItura Uses Airtime Data to Finance Healthcare

December 10, 2025
Next Post
Google-apolitical-nigeria

Google Partners With Nigeria to Train Civil Servants in AI Skills

GetEquity Has Done What Your Bank and Stockbroker Won’t: Give You Access to Loans Without Selling Your Investments

GetEquity Has Done What Your Bank and Stockbroker Won’t: Give You Access to Loans Without Selling Your Investments

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Subscribe to our Newsletter

Recent News

Google’s AI Try-On Now Works With a Selfie, No Full-Body Photo Needed

Google’s AI Try-On Now Works With a Selfie, No Full-Body Photo Needed

December 12, 2025
Starlink Launches Satellite Internet in São Tomé and Príncipe

Starlink Launches Satellite Internet in São Tomé and Príncipe

December 12, 2025
6 African Women Earned a Spot on Forbes’ 2025 World’s Most Powerful Women List

6 African Women Earned a Spot on Forbes’ 2025 World’s Most Powerful Women List

December 12, 2025
Terra industries, a nigerian firm improving data sovereignty in nigeria

Why Nigeria Needs More Companies Like Terra Industries to Protect Its Data Sovereignty

December 12, 2025
Google Empowers AI Growth in Africa with $37 Million initiative

Google and CyberSafe Foundation Unveil Resilio Africa

December 12, 2025

Where Africa’s Tech Revolution Begins – Covering tech innovations, startups, and developments across Africa

Facebook X-twitter Instagram Linkedin

Quick Links

Advertise on Techsoma

Publish your Articles

T & C

Privacy Policy

© 2025 — Techsoma Africa. All Rights Reserved

Add New Playlist

No Result
View All Result

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.