LIQUID C2 Report
LIQUID C2 Report
LIQUID C2 Report
com
The Evolving
Cyber Security
Landscape in Africa.
Cyber-attacks, hacking, data loss:
Decision-makers across South Africa,
Kenya and Zambia share their cyber
security concerns.
WE’LL C2 IT.
WE’LL C2 IT
Contents
Executive summary.................................................................................................4
Introduction................................................................................................................. 6
Cyber security trends in Africa.......................................................................... 7
Methodology and objectives............................................................................ 10
Methodology........................................................................................................... 10
The research objectives..................................................................................... 13
Core issues.................................................................................................................. 14
Perceptions: threat and risk.............................................................................. 16
The remote risk........................................................................................................ 20
Securing the cloud................................................................................................ 24
The sophistication equation........................................................................... 27
Cyber security investment................................................................................ 28
In conclusion.............................................................................................................. 31
The Liquid C2 perspective..................................................................................33
Essential areas of focus....................................................................................... 34
Endpoint detection and managed services.......................................... 34
The protection of data....................................................................................... 34
Email remains a priority.................................................................................... 34
Cyber security investment...............................................................................35
Security by intent and design..........................................................................35
Executive summary
In the past, cyber security has battled to gain traction and visibility at the
boardroom table. Considered a grudge purchase with a hint of hysteria, it was
relegated to a box-ticking exercise with limited resources that impacted efficiency.
Today, the picture is very different. Decision-makers have become increasingly
focused on risk mitigation strategies, cyber security investments and robust policies
designed to ensure that their organisations don’t fall victim to a threat that’s
become both virulent and sophisticated. The research found that there has been
a significant change in how decision-makers perceive cyber security and how it
has become one of the organisation’s top priorities, with Kenya showing the most
marked shift in awareness overall.
Most of those surveyed in South Africa are in a hybrid stage; Kenya has a
significantly smaller percentage of companies adopting a hybrid model, while most
are either fully remote or in the office, and Zambia has little to no remote working.
One of the primary threats cited by decision-makers around remote and hybrid
working was authorised use – the concern that the person accessing the device
or the company resources is not a family member or someone misusing company-
owned resources. There are concerns around managing this challenge alongside
malicious code from harmful websites and lost or stolen devices. Companies are
therefore focusing on security solutions that help them manage these challenges
more effectively, such as endpoint protection, firewalls, and backups. Two-factor
authentication has increased while staff awareness and training remain low.
All three countries emphasised that loss of reputation, financial impact and
business disruption were their primary concerns around a successful attack.
What is interesting is that all countries showed a marked increase in their belief
that they have done more to embed security than in the past - they are aware that
more attacks are on the horizon but feel that their cyber security posture has been
enhanced accordingly. However, as security is a moving target, most companies
have continued investing in cyber security solutions that consistently improve their
security posture. Business continuity and partnering with cyber security service
providers remain a high priority in South Africa and Kenya but low in Zambia
This report digs into these threads and trends to examine the
threats, challenges, perceptions and methodologies adopted by
South Africa, Kenya and Zambia as they manage the evolving
cyber security threat on the continent.
It highlights the areas of significant risk, provides insight into the impact of
cybercrime, and focuses on what companies can do to protect their assets, systems,
employees and information in 2023 and beyond.
Introduction
Since Liquid C2 published its first Cyber Security and Data Protection in Africa
report in 2016, there have been radical changes in both workstyle and security
threats. It was a different world, one that the COVID-19 pandemic and the dramatic
evolution of digital platforms, services and solutions had not fundamentally
reshaped. In Africa, the additional layers of complexity introduced by political
uncertainty, economic variability, ageing infrastructure and poverty continue to
influence how organisations operate and invest in the future.
Within this context, this report looks at some of the key trends that have emerged
over the past six years in Africa, specifically with regard to cyber security and cloud
services investments and strategies. Interviewing decision-makers and
IT professionals across South Africa, Africa and Zambia, the report sifts through
the data to reveal an increasingly aware and sophisticated landscape plagued by
inconsistencies and socio-economic challenges. The sample profile across all three
countries primarily came from banking and finance, education, manufacturing,
mining and quarrying, construction, communication, wholesale and retail trade.
Over the past three years, the Liquid C2 Cyber Security Report has analysed the key
concerns and challenges facing organisations regarding the cyber security threat
and revealed how attitudes and approaches have changed alongside increasingly
voracious cybercrime methodologies and attacks. Perhaps the most interesting
trend is the radical drop in how companies perceive their security measures.
In 2021 and 2020, hacking, email and data protection were the dominant
concern, with most citing that it was important to put measures in place to
protect data and systems. This dip in concern is aligned with the fact that
companies have put measures in place to combat cybercrime and their
belief that these mitigations are significantly reducing the risks. This belief
is echoed in the shift in perception around what impact a cyber security
breach would have on the business – on the whole. Organisations are less
concerned about business disruption, loss of data, and damage to reputation
than in the past.
However, the key trend here is a markedly increased focus on risk mitigation
and security investment that aligns with the emerging second trend.
Another thread that has emerged over the past year is around the
perception of a cyber security threat. In the past, cyber security has been
relegated to IT and reluctantly allocated budget as a grudge purchase forced
on the organisation by hype. Now, companies recognise the severity of the
threat – as reflected in the increased investment into security solutions and
systems – and are putting far more controls in place.
While regulation and legislation differ significantly across the three regions
surveyed in the report, it remains a growing challenge. Companies must
comply with regulatory expectations and ensure their security protocols
and parameters align with local and global expectations. This drives cyber
security awareness across the organisation – from the C-Suite to security
teams and employee security training.
This is perhaps one of the most important trends to emerge over the past
three years, as employee awareness remains one of the most effective
preventative measures. Leaders must stay focused on embedding security
training and understanding within the organisation, as this is one of the
most effective approaches to reducing the risk of a successful attack and
potentially impacting the organisation’s security posture.
On the other side of the skills development coin is the trend that hasn’t gone
away – cyber security talent. This challenge has worsened as the shortage
of skilled security personnel continues to impact the business and its ability
to hire and retain cyber security professionals. This has led to a marked shift
from in-house security teams to third-party security service provision as
companies look to provisioned teams to fill the gaps.
The impact of cyber security is felt across any organisation of any size. A
successful attack can bring down Goliath as easily as David. This makes the
investment into a robust and capable security posture as much an enabler as
an expense. It allows companies to expand their digital foundations, explore
new markets and opportunities, and build customer relationships with
confidence. This, perhaps more than anything in the Age of Information, is
critical to business longevity.
Moving forward…
In the third edition of the Liquid C2 Cyber Security Report, the research delved into
the most pressing technology and cyber security issues facing South Africa, Kenya
and Zambia organisations.
Methodology
70 40 29
South Africa Kenya Zambia
In South Africa and Kenya, the methodology for this study was to interview
respondents on a research panel and have agreed to participate in research panels
on an ongoing basis. In Zambia, the respondents were interviewed over the phone
from a list provided by Liquid.
Respondent roles:
36% 64%
Company size:
South Africa
45%
38% 41% 36% 38% 36%
25% 23%
19%
101 - 250 staff members 251 - 500 staff members 500+ staff members
Kenya
58%
45% 41%
39% 38%
30%
18% 20%
12%
51 - 100 staff members 101 - 150 staff members 150+ staff members
Zambia
62%
24%
14%
51 - 100 staff members 101 - 150 staff members 150+ staff members
Manufacturing
(inc. FMCG) Construction
If there has been increased cyber security threats and/or data breaches;
The research also undertook to unpack the cyber security perceptions around
remote working. To this end, it focused on:
In addition, the report looked at the following key issues and trends:
68%
Think hacking and unauthorised access are the
biggest cyber security concerns for the business
21%
South African organisations perceive that the biggest
impact of a cyber security breach is on finance.
20%
Kenyan organisations perceive that the biggest
impact of a cyber security breach is reputation.
74%
Think email attacks, including phishing and spam,
are the biggest cyber security threats.
30%
Zambian organisations perceive that the biggest impact
of a cyber security breach is towards business disruption.
60%
Think the most concerning business risk is the
illegal company or client information access.
76%
Believe that cyber security threats have
increased over the past year.
58%
Have experienced increased data breaches.
61%
Have experienced increased data breaches from
remote and hybrid working.
72%
Have implemented advanced endpoint
protection to mitigate the cyberthreat for
remote and hybrid working.
83%
Are considering business continuity services.
68%
Have appointed cyber security staff or signed up
with a cyber security team over the past year.
65%
Have a digital adoption strategy and roadmap
for the next two years.
However, perhaps the most startling result is that there has been a drastic drop in
how companies perceive their data’s safety, security and protection. For example,
in 2021, 53% felt that their protection measures were inadequate, but in 2022 this
dropped by 33%, with only 20% citing this as a concern.
Overall, most countries feel that the most significant impact a cyber security breach
would have on the business is financial. Still, South Africa prioritised this at 21%
compared with Kenya prioritising damage to reputation (20%) and Zambia prioritising
business disruption (30%). Across all three countries, financial impact, damage to
reputation and loss of important company information were the top three concerns.
Reputational damage remains a significant concern across all countries, and when it
comes to the most significant cyber security threats to the business, there have been
significant changes in perception compared to 2020 and 2021.
Email attacks that include phishing and spam have increased to 74% compared
with 67% in the previous years, while data breaches that include data extortion, data
leakage and data disclosure have risen to 61% compared with 2021’s 59%. In third
position, malware has risen from an average of 49% to 52%.
67%
Email attacks, including Phishing, SPAM 67%
74%
Identity Theft
40%
42%
Confidential information stored in public 53%
Cloud services
44%
40%
56%
Insider threats 20%
29%
0%
Loss of company/client data
50%
52%
Financial loss
50%
53%
Leakage of personal information
50%
54%
Theft of company/client information
42%
49%
Business disruption
41%
33%
Fraud
30%
54%
Reputational damage
29%
Other 2%
Vulnerability Management
23%
22%
21%
Patch Management
20%
14%
Secure Access Service Edge (SASE)
19%
Companies are paying attention to the security controls and safeguards they need
to put in place to mitigate the threats, but there needs to be more of a focus on
data protection. Solutions such as web application firewalls and penetration testing
should become more of a focus alongside endpoint detection and response in the
form of managed detection and response that ensures constant event monitoring
and visibility into the security environment.
It has become critical that organisations have the tools and platforms to rapidly
identify and address these threats and engage with managed security services
providers that can shift their security approach from a reactive stance to a proactive
one. This is a need that organisations have identified, with 64% prioritising
partnering with a cyber security operating centre and investing in cyber security
services that enable their ability to work offsite (56%).
Ability to
work offsite 56% 16% 28%
High
Business consideration
continuity 83% 6%11% across all 3
services countries
Cloud remains an important digital transformation and investment pillar for the
African organisation. It is also linked to some of the most prevalent types of
Cloud remains an
important digital
transformation
and investment
pillar for the African
organisation.
Online meetings
(Teams, Zoom, Skype) 77% 81% 60% 80% 80% 61%
Google 54%
53%
Microsoft Azure /
AWS, etc 37% 35% 29% 41%
Kenya Zambia
2020 2021 2022 2022
Sample 45 69 70 29
Movements of 12% or
Online meetings
more are noted for
(Teams, Zoom, Skype) 72% 82% 60% 55% Kenya
Microsoft Azure /
AWS, etc 44% 28% 31%
The key elements of cloud adoption strategy across all three countries are primarily
focused on security (60%), with this percentage broken down into data security
(29%), hacking (4%) and network security (2%). The remaining 50% was balanced
across strategic cloud investment for business (14%) and cloud services (22%). The
latter saw most countries looking to develop a universal cloud system (9%), optimise
cloud (5%) and migrate to a new cloud solution (3%).
However, the concern is that the average spend on staff training is low at 15%,
which indicates that there is not enough emphasis on the behavioural and people
element of cyber security. According to respondents, staff training is the investment
that delivers the least return on investment (ROI) at only 4% – a concern in light of
how people are most often the weakest link in any security strategy.
Some of the key elements that companies perceived to deliver the most ROI were:
7% 7%
Data protection Firewall protection
4% 4%
Two-factor authentication or Antivirus protection
multi-factor authentication
While several key trends emerged within this report and over the past three years,
the golden thread that runs through 2022 and into 2023 is the perception of
sophistication. All respondents highlighted that they had advanced significantly
in their cloud and digital strategies and cyber security capabilities. In 2022, 58% of
companies felt that their digital platforms and strategies were sophisticated with
advanced security and services, compared with 21% in 2019. In fact, most were in the
early stages in 2019 (44%) compared with only 14% today, and this has led most to
believe that they are more sophisticated and have more protection.
Companies were asked what best described their digital journey in 2019, and what best
describes their digital journey now in 2022.
Early
adopter 44% 44% 45% 41%
(e.g. basic
website) 14% 16% 12% 14%
Mid stage
(e.g. more
35% 36% 32% 38%
sophisticated
website, online
shopping (not
28% 24% 28% 38%
able to bulk order,
remote work)
Advanced
(e.g. very
21% 20% 22% 21%
sophisticated
website, advanced
58% 60% 60% 48%
online shopping,
advanced security)
With this picture in mind, the report examined how organisations invest in their
cyber security personnel and systems. When asked if they had appointed cyber
security staff members or signed up with a cyber security team in the past year,
68% said yes, and 32% said no. Kenya had the highest yes percentage at 82%,
followed by South Africa (63%) and Zambia (62%).
Of the 32% who said no, the top reasons behind this decision were:
9% Have an internal
skillset. 7% Adequate
staff.
The concern for countries like South Africa, where financial strain limits cyber
security investment, is that they are under intense pressure to perform to ever-
higher security expectations with increasingly lower budgets and limited expertise
when accompanied by the growing talent shortage.
The percentage of the IT budget allocated to cyber security saw significant shifts
over the past three years. In 2020, companies that had allocated more than 15% of
their IT budget to managing cyber security sat at 25%. This increased to 30% in
2021 and then dropped to 18% in 2022. In the category of companies that dedicate
11-15% of their IT budget to cyber security, the investments have remained relatively
the same from 2020 (29%), 2021 (31%) and 2022 (33%). Across all three countries, this
is the most common range of IT spend towards security, with the remainder split
fairly evenly across the 6-10% and 15% ranges.
The minimum spend should sit at 15%, possibly even up to 20%, in light of how
severe the threat landscape is right now and how costly the fall-out is in the event
of a successful attack.
0% 1% 2%
Zambia, however, had 48% of companies respond with ‘don’t know’ and only 14%
with $15-$50 per employee per month.
10%
39%
36%
55%
42%
42%
NIST Cyber Security
ISO 27001
Framework
3%
14%
37%
46%
50%
28%
In conclusion
There has been a significant decrease in inadequate safety, security and protection of
data in 2022, with a majority of organisations moving much further down the digital
adoption road. There is a marked increase in awareness and the implementation
of cyber security measures post the global pandemic. However, nearly two in three
companies experienced a data breach in the past year, and the most significant
threat remains hacking across all three countries, even more in Kenya. This is closely
followed by unauthorised access and cyber-attacks, with companies concerned about
confidential information being stolen or accessed, particularly in Kenya and Zambia.
South African and Kenyan companies are still worried about the financial and
reputational impact of an attack, while Zambia is primarily concerned with the
disruption to the business. As hybrid working continues to gain traction and adoption,
the biggest threats to the business are seen as coming through email, making it
imperative that companies focus on protection and security in the hybrid environment.
Given the limited attention paid to training and education, this is one of the critical
factors that companies should be paying attention to moving forward, along with
password protection on laptops and regular reminders to staff members.
Cyber security teams are in place at around two-thirds of companies, but there remain
challenges around costs, particularly in South Africa. Approximately 7% of companies
say they outsource to ensure they have the necessary skills, but the cost and allocated
budget are issues. This is reflected in how the budget for cyber security as a percentage
of IT spending hasn’t changed since 2021.
The Zambian market appears not as advanced as South Africa and Kenya, which could
be either a result of low awareness or fewer threats. On the other hand, Kenya appears
to be the most aware, as 90% of respondents had a data breach in the past year.
Kenya
Zambia
Companies in the region cite data loss, including data exfiltration or leakage, as a
concern and put business disruption as their most considerable perceived fall- out
at 31%, which is higher in comparison to the 12% average across all countries.
Although Zambia recorded the lowest threats compared to other countries, 62% say
the threats have increased in the past year. Interestingly, Zambia does not support
a solely remote working model, with 55% being in the office and 45% following a
hybrid model.
Cyber security attacks are more virulent, sophisticated and frequent today than
ever before. This makes it even more challenging for companies to defend against
them and makes it critical for cyber security to remain at the heart of every
business conversation. The report revealed a landscape where companies prioritise
security but remain constrained by limited access to talent and budgets. This is
why it has become vital for organisations to collaborate with trusted third-party
managed security services providers (MSSPs) to reinforce and refine their security
postures while remaining aligned with budgets and spend.
happening within them. We provide organisations with the transparency they need
to remain in control of their security while rapidly identifying possible threats and
addressing them at speed. With our services, organisations shift from a reactive
stance to a proactive one – making decisions based on situational awareness and
leveraging tools such as penetration testing to consistently catch and address
vulnerabilities and areas of weakness.
There is far too little focus on the protection of data across all companies, with
limited visibility into who has access to the data, the location of the data, those
accessing it, and the protection of this data across multiple devices and platforms.
There are ongoing concerns around the physical theft of laptops, whether the data
is encrypted or adequately stored, and who now has access to privileged
Email is still a concern, and it should be. The first line of defence should be email
protection – nobody should receive an email until it has gone through the proper
filtering and checks to mitigate the risks of phishing, spam and malware, among
others. Regardless of the organisation, email should flow through rigorous checks
and balances before it reaches the end user. Liquid can C2 it that your business has
all the right measures in place – ensuring that you have multi-layer protection and
robust threat controls to ensure that email remains an asset, not a risk.
As ransomware, a threat that still uses email as one of its primary distribution
mechanisms remains a high threat, Liquid offers Bullwall RansomCare – a solution
that picks up when the ransomware encryption is initiated and stops it from
continuing. This limits the impact of the ransomware attack and significantly
reduces the threat and any potential damage.
Cyber security should be high on the agenda of the organisation. The risks are
evolving, and their sophistication is increasing. This is further complicated by the
rise of compliance across legislative and regulatory requirements worldwide. In
addition, organisations need to pay attention to user awareness and training to
mitigate the serious risk of user error – no matter how sophisticated the system
or advanced the controls, human error is a huge contributing factor to security
breaches.
Another area that requires a change is the levels of cyber security investment. The
survey found that the majority of companies have their investment sitting in the 11-
15% bracket, but the reality is that they should be spending at least 20% on average
to ensure that their cyber security posture is robust enough to handle the threats. It
is a concern – companies need to find a balance between their IT spend for growth
and their cyber security spend for protection. Liquid can provide organisations with
customised security management and controls that blend seamlessly with cloud
investment strategies and remote or hybrid working frameworks.
Our skillsets and broad range of expertise ensure that any skills gaps within the
organisation are easily overcome. We provide the tools and services required to
deftly manage cloud systems, data protection, email, and more. Our capabilities
across Microsoft, Google and multiple other cloud platforms mean that you don’t
need to invest into in-house talent, as we can help you integrate and secure your
digital investments with ease.
We collaborate with intent - we know that there are multiple factors to consider
and that each business is unique. So we create a cyber security framework and
posture that delivers reliable protection against cyber security threats, cyber-
attacks, data loss, data breaches and more.
www.LiquidC2.com