BeyondTrust (www.BeyondTrust.com), the worldwide leader in intelligent identity and access security, today announced the release of a new IDC Technology Spotlight report, “Africa’s Road Map to Identity Maturity and Security Using Privileged Access Controls.” Sponsored by BeyondTrust, this report examines the need for identity-focused security in Africa, highlighting the digital adoption trends that lead to vulnerable business postures and the methods for enhancing security strategies using privileged controls. The overall goal of the report is to help establish a sound privileged access security strategy roadmap for Africa.
In this report, an IDC analyst reviewed key findings from multiple IDC Security Surveys (2022-2023) in addition to IDC’s Worldwide Security Spending Guide (2023) to assess why cybersecurity remains a challenge across Africa. The report also makes recommendations to African organizations on how to get their cybersecurity roadmap aligned with demonstrated threats.
Conclusions drawn from the report indicate that:
“More than ever, entities in Africa need to get serious about identity security,” said Shilpi Handa, Associate Director Research — Cybersecurity, IDC. “Investments in identity security in Africa have been low, despite the high rate of curated spear phishing attacks plaguing the continent. In early 2022, when IDC surveyed 209 organizations across Sub-Saharan Africa, just 18% said they were using PAM solutions.”
More than 90% of businesses on the continent were operating without the minimum necessary cybersecurity protocols
Key findings from the report revealed:
Many organizations in Africa are still unprepared for cyberattacks
Phishing is the top threat in SSA
Zero trust initiatives were ranked second in terms of expected investment
“Securing identities and access is critical to combatting today’s cyberthreats,” said Morey Haber, Chief Security Officer, BeyondTrust. “By securing the privileges and access that make compromised identities dangerous, we are empowering organizations to proactively safeguard the critical assets across their estate, even in today's evolving threat landscape.”
To learn more about the cybersecurity landscape in Africa, or view the recommended approach to Privileged Access Maturity, download IDC’s full report here (https://apo-opa.info/48RrO1h).
Distributed by APO Group on behalf of BeyondTrust.