ADVERTISEMENT
Get Started
  • About Homebase Tv | Hbtvghana.com
  • Advertise
  • Broadcast Live
  • Disclaimer
  • Privacy & Policy
  • Terms and Conditions
  • Vacancies
  • Contact Us – Connect With Us
Homebase Tv - Hbtvghana.com
  • Home
  • General News
  • Business News
  • Health
  • Life & Style
  • Politics
    • Press Release
    • Parliament
  • Sports
No Result
View All Result
  • Home
  • General News
  • Business News
  • Health
  • Life & Style
  • Politics
    • Press Release
    • Parliament
  • Sports
No Result
View All Result
Homebase Tv - Hbtvghana.com
No Result
View All Result
ADVERTISEMENT
ADVERTISEMENT

New International Data Corporation (IDC) Technology Spotlight Report Situates Identity Security at the Center of Much-Needed Security Practices

Mon, Oct 16 2023 7:00 AM
in Ghana General News, News
new international data corporation idc technology spotlight report situates identity security at the center of much needed security practices
0
SHARES
3
VIEWS
Share on FacebookShare on TwitterShare on TelegramShare on Whatsapp
ADVERTISEMENT
e925d76ee2eed52 e5b3dI

BeyondTrust (www.BeyondTrust.com), the worldwide leader in intelligent identity and access security, today announced the release of a new IDC Technology Spotlight report, “Africa’s Road Map to Identity Maturity and Security Using Privileged Access Controls.” Sponsored by BeyondTrust, this report examines the need for identity-focused security in Africa, highlighting the digital adoption trends that lead to vulnerable business postures and the methods for enhancing security strategies using privileged controls. The overall goal of the report is to help establish a sound privileged access security strategy roadmap for Africa.

In this report, an IDC analyst reviewed key findings from multiple IDC Security Surveys (2022-2023) in addition to IDC’s Worldwide Security Spending Guide (2023) to assess why cybersecurity remains a challenge across Africa. The report also makes recommendations to African organizations on how to get their cybersecurity roadmap aligned with demonstrated threats.

Conclusions drawn from the report indicate that:

There is a massive lack of maturity in identity protocols: As the physical demarcation of network perimeters expands, African organizations need to realign their IT security investments in cybersecurity protocols. IT’s focus has not evolved with the threats, and current strategies are now outdated.
PAM and Identity security should be at the core of modern security practices: Organizations should focus on creating identity-based perimeters and access-based boundaries. IDC recommends that African organizations start by securing privileged users.
Preparation for a breach should always be the main plan: Organizations must be prepared to enforce strong application, password management, least-privileged controls, and just-in-time access policies to prevent phishing-initiated breaches. Most compliance mandates require all privileged access sessions to be monitored and managed and evidence to be maintained.

“More than ever, entities in Africa need to get serious about identity security,” said Shilpi Handa, Associate Director Research — Cybersecurity, IDC. “Investments in identity security in Africa have been low, despite the high rate of curated spear phishing attacks plaguing the continent. In early 2022, when IDC surveyed 209 organizations across Sub-Saharan Africa, just 18% said they were using PAM solutions.”

Key findings from the report revealed:

ReadAbout

National Premix Fuel Secretariat, MMDCEs intensify accountability drive nationwide to recover community development funds

NYPD delegation visits Accra to deepen policing partnership with Ghana Police Service

Utility tariffs drop: Electricity down 4.81%, water down 3.06% starting April 1

Many organizations in Africa are still unprepared for cyberattacks

More than 90% of businesses on the continent were operating without the minimum necessary cybersecurity protocols.
Only a handful of countries have cybersecurity regulations in place to protect consumers and businesses.
Investments in identity security in Africa have been low, despite the high rate of curated spear phishing attacks.
Overall privileged access control adoption was surprisingly low. In September of 2022 only 18% of organizations surveyed said they were using PAM solutions, and Multifactor authentication (MFA) adoption stood at a mere 34%.
Companies and their employees are not the only ones vulnerable to cyberthreats; individual identity itself is at risk from cyberattack in Africa today.

Phishing is the top threat in SSA

Phishing (62%) and insider threats (51%) are among the top 5 threats in SSA.
The rate at which phishing is growing in the region is worrisome and likely to become more severe with the increasing adoption of generative AI (GenAI) by hackers.

Zero trust initiatives were ranked second in terms of expected investment

Automated response to security incidents is considered to be the most important investment priority (73%) in the next 12-18 months. Zero trust initiatives ranked second (52%).
Privileged access management (PAM) and identity and access management (IAM) were key projects on the zero trust journeys of 61% of CISOs in South Africa.
53% of respondents in South Africa regarded cloud entitlement management (or the use of identity-specific tools to monitor/manage entitlements and access to cloud resources) as their second most important cloud investment priority for the next 12–18 months.

“Securing identities and access is critical to combatting today’s cyberthreats,” said Morey Haber, Chief Security Officer, BeyondTrust. “By securing the privileges and access that make compromised identities dangerous, we are empowering organizations to proactively safeguard the critical assets across their estate, even in today’s evolving threat landscape.”

To learn more about the cybersecurity landscape in Africa, or view the recommended approach to Privileged Access Maturity, download IDC’s full report here (https://apo-opa.info/48RrO1h).

Distributed by APO Group on behalf of BeyondTrust.

Contact f​or BeyondTrust:
Yasmina Bileoma
APO Group for BeyondTrust
P: +221761759222
E: [email protected]  

Follow BeyondTrust:
Twitter: https://apo-opa.info/3FgPsXc
Blog: https://apo-opa.info/3Fk5Jea
LinkedIn: https://apo-opa.info/3rRzhN4
Facebook: https://apo-opa.info/3PVtduV

About BeyondTrust:
BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We offer the only platform with both intelligent identity threat detection and a privilege control plane that delivers zero-trust based least privilege to shrink your attack surface and eliminate security blind spots.

BeyondTrust protects identities, access, and endpoints across your organization, while creating a superior customer experience and operational efficiencies. We are leading the charge in innovating identity-first security and are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners. Learn more at www.BeyondTrust.com.

DISCLAIMER: The Views, Comments, Opinions, Contributions and Statements made by Readers and Contributors on this platform do not necessarily represent the views or policy of Multimedia Group Limited.

Tags:  

  • President Commissions 36.5 Million Dollars Hospital In The Tain District
  • You Will Not Go Free For Killing An Hard Working MP – Akufo-Addo To MP’s Killer
  • I Will Lead You To Victory – Ato Forson Assures NDC Supporters

Visit Our Social Media for More

About Author

c16271dd987343c7ec4ccd40968758b74d64e6d6c084807e9eb8de11a77c1a1d?s=150&d=mm&r=g

hbtvghana

See author's posts

Discover interesting ones too

Constitutional reforms: Youth leaders rally behind proposal to lower presidential age to 30

Constitutional reforms: Youth leaders rally behind proposal to lower presidential age to 30

1
National Premix Fuel Secretariat, MMDCEs intensify accountability drive nationwide to recover community development funds

National Premix Fuel Secretariat, MMDCEs intensify accountability drive nationwide to recover community development funds

0

PURC cuts electricity and water tariffs from April 1 — here’s what you’ll pay

NACOC receives £56,752 drug detection equipment from Home Office International Operations

NACOC receives £56,752 drug detection equipment from Home Office International Operations

Ghana, Serbia strengthen cooperation on family and child protection

Ghana, Serbia strengthen cooperation on family and child protection

Diane Abbott honoured with Woman of the Century award at Women of Valour 2026

Diane Abbott honoured with Woman of the Century award at Women of Valour 2026

Ghana Medical Trust Fund donates dialysis machines to Sunyani Teaching Hospital

  • Dr. Musah Abdulai: If the Chief Justice returns: Will it lead to reset, redemption, or rupture?

    Dr. Musah Abdulai: If the Chief Justice returns: Will it lead to reset, redemption, or rupture?

    0 shares
    Share 0 Tweet 0
  • Haruna Iddrisu urges review of salary disparities between doctors in academia and health service

    0 shares
    Share 0 Tweet 0
  • Heavily armed Burkinabè soldiers arrested in Ghana

    0 shares
    Share 0 Tweet 0
  • No justification for higher GAF entry age – Col. Festus Aboagye (Rtd.)

    0 shares
    Share 0 Tweet 0
  • East Airport land tensions escalate as residents reject “Attorn Tenancy” notices; court orders show no evictions pending

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT
ADVERTISEMENT

Follow Homebase Tv

  • About Homebase Tv | Hbtvghana.com
  • Advertise
  • Broadcast Live
  • Disclaimer
  • Privacy & Policy
  • Terms and Conditions
  • Vacancies
  • Contact Us – Connect With Us

© 2014 Total Enjoyment & Proper News

No Result
View All Result

© 2014 Total Enjoyment & Proper News

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.