Business Guide To Cyber Security

Transcription

BUSINESS GUIDE TOCYBER SECURITYinnovation & technologyMEDIA PACK 2021NOVEMBER 2021Another quality Special Interest publication by

Cyber security has become one of the biggest risk areas for businesses. This has always been an ever growingbusiness priority, however the global pandemic has escalated and amplified the critical role cyber securityplays in not only supporting growth initiatives, but also in protecting business wealth, intellectual propertyand most importantly business reputation. Recent security research indicates that most companies haveunprotected data and weak cyber security measurements and practices in place, making them vulnerable todata loss. POPIA now also exposes companies to legal consequences due topersonal data security breaches and hacking. This Special Interest Publicationwill showcase the imperative strategic and operational actions required inrelation to cyber security best practices, cyber crime prevention and theaccelerated impact of technological innovation and the sustainable ROIas and when innovation becomes part of the business culture.EDITORIAL CONTENT1.2.3.4.5.6.7.Why cyber security mattersRansomware, malware, phishing, whaling – Cyber-security 101Impact of Covid on cyber securityRemote working impact - Setting up a secure home IT infrastructureFemale Tech LeadersThe world in 2030 – The Future of Cyber SecurityIdentity and Access Managementa) Physical IDAM (access control) and IDAM for cloud identitiesb) System design, advantages of automation and good data hygienec) 2FA, biometrics, zero trust and other ways of improving security8. North-South security vs East-West security & Micro-segmentation9. PoPIA, GDPR and governance, risk and compliance10. Backup and disaster recovery – why, how and the options11. New threats and how to secure them – cloud, IoT, low and slow attacks etc12. Impact of a breach – reputational, financial, loss of customers etc13. Importance of a dedicated security specialist (like a CISO) and for them to have a seat on the board14. Security training and white phishing programmes and constant security education for employees95% of cyber securitybreaches are causedby human errorSource: Cybint2

BRAND EXTENSION FOR 3S MEDIA BRANDSWater& SanitationAfricaEDITORIAL PILLARS1Innovation2Technology3Cyber Security4Security Training5Impact of global pandemic6Risk vs ROISince the pandemicbegan, cybercrimeincreased by 300%Source: (IMC Grupo)3

Technological innovationaccelerates business growthahead of the curve. Clearfocus, timing and quality ofexecution determines ROIIMPACTFUL CYBER SECURITY FACTS AND STATS Data breaches exposed 36 billion records in the first half of 2020. (RiskBased)86% of breaches were financially motivated and 10% were motivated by espionage. (Verizon)45% of breaches featured hacking, 17% involved malware and 22% involved phishing. (Verizon)The top malicious email attachment types are .doc and .dot at 37%, the next highest is .exe at 19.5%. (Symantec)The average cost of a data breach is 3.86 million as of 2020. (IBM)The average time to identify a breach in 2020 was 207 days. (IBM)And the average lifecycle of a breach was 280 days from identification to containment. (IBM)Personal data was involved in 58% of breaches in 2020. (Verizon)94% of malware is delivered by email. (CSO Online)The average cost of a ransomware attack on businesses is 133,000. (SafeAtLast)48% of malicious email attachments are office files. (Symantec)1 in 36 mobile devices have high- risk apps installed. (Symantec)Worldwide cybercrime costs will hit 6 trillion annually by 2021. (Cybersecurity Ventures)In April 2020 alone, Google blocked 18 million daily malware and phishing emails related to Coronavirus. (Google)Half a million Zoom user accounts were compromised and sold on a dark web forum in April 2020. (CPO Magazine) Technological innovation will not only deliver sustainable growth and ROI, it will be the only digital smartsolution to counter cyber attacks, hacking, phishing, cryptomining, ransomware, malicious scripts. Innovation can be intangible, as opposed to technology, which is tangible. Technology can be used to implement innovation, but the technology itself doesn't necessarily produceinnovation. Having said that, technology propels innovation forward and enables increased experimentationand boosts tinkering. This in itself accelerates innovation processes. The symbiotic relationship between Technology and Innovation should be used to stimulate efficiency Technology creates opportunities to enhance value creation and retention Technology is an innovation enabler Technology is the driver of business model innovations4

On average, only 5% ofcompanies' folders areproperly protectedSource: VaronisTARGET MARKETPRINTDISTRIBUTIONThis Business-to-Business magazine will target:The magazine will be distributed to atargeted database of 3S Media SpecialProjects. The sectors that will becovered includes the: Mining industryConstruction sectorHealth industryEngineeringPublic sectorHospitalityBusiness eventing & conferencesTravel & TourismFinancial & InvestmentTelecommunications &Retail sector20 680PRINT ORDER: 8 00029 770 Business professionals & business owners. C-level executives Mid and senior management Medium to small businesses, often using outsourcedIT service providers Secondary target market: CIO and ICT ManagerDIGITAL DISTRIBUTIONTo maximise the publication's footprint and ensureeffective, widespread reach, we employ a hybrid platformdistribution and direct marketing methodology. Through utilising3S Media's extensive targeted opt-in distribution database, whichspans multiple professional sectors, we leverage the inherentpower of our numerous brands' weekly newsletters, websites andsocial media pages. Digital magazines encourage engagementand interactivity with website addresses as well as emailaddresses being hyperlinked. Videos are easily embedded in thecontent and digital magazines are seemlessly shared betweenprofessional peer groups.13 25442 87343 290Novus Print (Pty) Ltd is a proud Level 2 B-BBEE Contributor.Click here to view our certificate of accreditation.Novus Print (Pty) Ltd isa registered member of NationalTreasury’s Central Supplier Databasefor Government.Supplier Number:MAAA0016423Unique Registration Ref Number:FFA60BC9-37E6-4596-89D9-A00025D4C50FClick here to visit the National Treasury website.5

Cloud-based cyberattacks rose 630%between January andApril 2020 Source: Fintech NewsRANGE OF ADVERTISING PACKAGESR46 000R40 0006 pages made up of:5 pages made up of:Section sponsorship pages including4branded content 2 interviews tobe conducted2 display advertsI ncludesdigimag uploadSILVERGOLDPLATINUMBRONZE 1 display advertsI ncludesdigimag uploadR18 000R25 000R33 0004 pages includingbranded content 1 interview tobe conductedPARTNER4 pages made up of:3 pages made up of:3 pages includingbranded content2 pages includingbranded content1 display advert1 display advertor display advertsI ncludesdigimag uploadI ncludesdigimag upload Includes12 x print copies 10 x print copies5 x print copies2 pages made up of: 2 pages includingbranded contentdigimag upload16 x print copies 20 x print copiesDISPLAY ADVERTSCOSTFull-pageR11 000Half-pageR7 000Third-pageR4 000Double Page SpreadADVERT DESIGNNecessary elements (images, copy, logo, etc. to be supplied by client)MATERIAL DEADLINESR18 000SPECIAL POSITIONSPUBLICATION COVERSR21 000Inside back cover DPSR19 000Outside back coverR14 000Inside front coverR14 000Inside back coverR17 000Opposite contents pageR14 00004 November 2021Material deadline16 November 202111 November 2021ADVERT SPECIFICATIONS(To be supplied as press optimised, high-resolution PDF file, 300 dpi)COSTInside front cover DPSSold content booking deadlineDisplay advert booking deadlineTRIM AREABLEED AREA210 mm wide x 297 mm high 216 mm wide x 303 mm high 190 mm wide x 277 mm highPrint terms and conditions Advertising display rates include design.Please refer to https://3smedia.co.za/about/terms-conditions/ for our AdvertisingTerms & Conditions*All the above prices in ZAR exclude VAT.CONTACT6TYPE AREAADVERTISING SALESEDITORIALElri Klee 27 (0)83 268 9776Elri.Klee@3smedia.co.zaRodney Weidemannrodneyw@copygen.co.za

b)System design, advantages of automation and good data hygiene c)2FA, biometrics, zero trust and other ways of improving security 8. North-South security vs East-West security & Micro-segmentation 9. PoPIA, GDPR and governance, risk and compliance 10. Backup and disaster recovery - why, how and the options 11. New threats and how to secure .