Techsoma Homepage
  • Policy & Regulations
  • Artificial Intelligence
  • Reports
  • Policy & Regulations
  • Artificial Intelligence
  • Reports
Home Cybersecurity

Cybersecurity Strategies: Inside-Out Protection for Modern Businesses

by Faith Amonimo
October 23, 2025
in Cybersecurity, Event Radar Africa
Reading Time: 4 mins read
Techsoma Africa

The password “admin123” seemed harmless enough until hackers used it to infiltrate an entire corporate network, stealing customer data and shutting down operations for days.

This real case, shared at South Africa’s 2025 IT Indaba, shows how human mistakes continue to create massive security holes even as companies spend millions on advanced cybersecurity tools. New research reveals that human errors cause 68% of all data breaches in 2024, with manual processes still dominating critical security tasks.

Security Teams Build Walls While Employees Leave Doors Open

Companies treat security like building a fortress. They install expensive firewalls, hire security experts, and buy the latest threat detection software. But they forget that employees hold the keys to the kingdom.

“Our analysts and developers assume that every new feature, every API we deploy and every line of code we write could and most probably will be targeted in an attack. If you have that mindset, it changes everything”, said Jan-Jurgens van der Walt, business unit head of technology at iOCO, during his presentation on security-first development practices.

His team embeds security specialists into every project from day one. They don’t add security at the end like most companies do. They bake it into the foundation.

Johan van Dyk, executive head of forensic services at XTND, sees the aftermath when companies take shortcuts. The printer attack happened because someone never changed the default login credentials. Basic human oversight created a billion-rand security disaster.

Manual Security Processes Create Predictable Failures

Recent data from Cerby’s 2025 Identity Automation Gap report exposes alarming gaps in how companies handle basic security tasks:

  • 41% of employees still share passwords through spreadsheets and email
  • 89% of companies rely on workers to manually turn on multi-factor authentication
  • 59% of IT teams manually add and remove user access rights

These manual processes fail because humans forget, make mistakes, or skip steps when rushed. Companies that experienced security breaches from manual identity work lost customers (43%) and business partners (36%) as direct consequences.

Neil van Wyngaard, solutions architect at iOCO, argues that automation removes these human failure points entirely. “If the process of giving people access to resources was automated, you can prevent people from having access to systems they are not supposed to have access to,” he explained during the IT Indaba session.

Voice Technology Catches Dishonest Employees Before They Start

Traditional background checks miss a crucial element which is honesty. Van Dyk’s forensic team now uses voice technology to test integrity before hiring people for security-sensitive roles.

“In our business, we make use of voice technology, which is not intrusive at all. It can be done by telephone, it is not language dependent, and it helps us test honesty before we employ or appoint people,” van Dyk revealed.

The technology analyzes speech patterns to detect deception without requiring face-to-face meetings or specific languages. Several cybersecurity partners now use this approach to verify their staff members actually follow security protocols.

Voice testing addresses a growing concern that insider threats account for 23% of cybersecurity breaches in financial services alone, according to industry statistics.

Security Automation Reduces Errors, But Faces Trust Issues

Automation prevents the memory lapses and shortcuts that create security gaps. Van Wyngaard demonstrated how automated systems continuously monitor access rights and immediately flag unusual activity.

“If the security becomes invisible, sitting behind the scenes while automation maintains it, people don’t mind because they don’t have to do it. The moment it becomes a chore, they avoid it or make mistakes,” he noted.

However, artificial intelligence adoption in security faces resistance. While 78% of security leaders don’t trust AI to fully automate core identity tasks, 45% support collaborative approaches where humans oversee AI decisions.

Companies successfully using automation report dramatic improvements. Van Dyk’s firm maintained the same 75-person workforce over three years while dramatically increasing productivity through AI and process automation. No employees lost jobs; instead, they learned to work alongside automated tools.

Business Leaders Must Champion Security Culture

Technical solutions fail without leadership support. Van der Walt emphasized that embedding security requires both clear governance and daily habits reinforced by executives.

“Security should not be about adding a gate. It should be about creating secure habits and making them part of your delivery process,” he stated.

Teams that integrate security reviews into every development phase and discuss security incident lessons create lasting cultural change. This approach transforms security from a compliance checkbox into a competitive advantage.

Companies treating security as an afterthought face predictable consequences. The Ponemon Institute found that 52% of enterprises experienced security breaches caused by manual identity management processes.

AI Security Requires Careful Data Separation

As companies adopt AI tools, new vulnerabilities emerge. Van Wyngaard warned against storing sensitive information directly in large language models.

“You can’t put sensitive information into the model. Keep it in a database, expose it via an API, and use two AI layers. One determines the intent, the other verifies the user before retrieving data. That way, you can’t hack the AI,” he advised.

This approach separates generic AI capabilities from confidential business data, preventing attackers from accessing sensitive information even if they compromise the AI system.

The combination of secure development practices, automated processes, and strong leadership support creates resilient security programs. Companies that master this inside-out approach transform their biggest vulnerability, which is human behaviour, into their strongest defense.

Faith Amonimo

Faith Amonimo

Moyo Faith Amonimo is a Tech Writer and Newsletter Editor at Techsoma Africa, where she reports on technology and digital...

Recommended For You

Data Protection
Cybersecurity

What Nigeria’s Data Protection Law Actually Means for Everyday Internet Users

by Kingsley Okeke
April 28, 2026

Every time you sign up for a food delivery app, apply for a loan through a fintech platform, or scroll through a social media feed tailored to your habits, you...

Read moreDetails
RANKED 2026

RANKED 2026 Launch Set to Spotlight Declining Traffic and Rising Influence in African Media

April 23, 2026
Mozambique cyber laws illustration showing secure digital networks, online safety, and Africa-wide tech policy growth

Mozambique Cyber Laws and Africa’s Path to Safer Digital Growth

April 22, 2026
Vercel security breach

Vercel Under Attack: Hackers Demand $2 Million Ransom to Halt Global Supply Chain Threat

April 19, 2026
CAC cyber attack

CAC Under Cyber Attack: Smart Steps to Secure Your Business Records Today

April 15, 2026
Next Post
Google-apolitical-nigeria

Google Partners With Nigeria to Train Civil Servants in AI Skills

Techsoma Africa

GetEquity Has Done What Your Bank and Stockbroker Won’t: Give You Access to Loans Without Selling Your Investments

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter

Recent News

ai-layoffs-in-tech-real-reason-behind-the-cuts

The Real Story Behind Job Layoffs and Why Your Skills Still Matter

April 28, 2026
Online betting regulation in Africa

How Africa Is Taking Back Control of Online Betting

April 28, 2026
Kiwe Co-founders

Kiwe wins final CBE approval to launch its app and card in Egypt

April 28, 2026
Mastercard LOGO

Mastercard is scaling up in South Africa as faster payments and fintech deals grow

April 28, 2026
Techsoma Africa

Google opens 100,000 free tech scholarships in Ghana

April 28, 2026
Techsoma Africa

Techsoma Africa reports on startups, fintech, AI, digital policy, and the builders shaping Africa’s innovation economy.

Facebook X-twitter Instagram Linkedin

Company

About

Contact

Advertise

Site Map

Coverage

Startups

Fintech

Artificial Intelligence

Reports

Resources

Privacy Policy

RSS Feed

News Sitemap

Policy & Regulations

Copyright 2026 Techsoma Africa. All rights reserved.

No Result
View All Result
  • Reports
  • Policy & Regulations
  • Artificial Intelligence
  • About
  • Contact
  • Advertise

Copyright 2026 Techsoma Africa. All rights reserved.