Cyber Army To Defend Cyber Attacks


Africa’s leading cyber security firm, LAWtrust, recommends South African businesses and individuals take the following steps to protect themselves from Petya and similar cyber attacks :

  • Keep your operating system and your applications up to date
  • Organisations must raise awareness among staff with regard to information and cyber security
  • Treat email communication carefully – especially unsolicited emails. Do not open links or attachments if you do not know what these are. Confirm with the email sender if needed
  • Back up your data regularly and have a recovery plan in place
  • Encrypt your sensitive data, especially the private data of clients
  • Put measures and technology in place to help your clients be able to identify emails and documents originating from your organisation (such as use of digital signatures, email encryption, secure portals, etc.)

South Africa is not immune to recent cyber security breaches. It’s a matter of time before other countries are affected by similar threats.  The South African government should consider setting up  a Cyber army not to kill but with the sole focus of defending health,transport,telecommunications and other critical systems.

The army should no longer view threat as something that will be visible to the naked eye. More threats will come from the cyber space however such threats will have a negative impact on people’s a lives and businesses. The government should consider training young unemployed technology graduates in defending national systems using their technology skills before it’s too late.

The German government realised the seriousness of cyber attacks as a result recently they launched a Cyber army.  The German Cyber army will have its own independent organizational structure, thus becoming the sixth branch of the German military – on a par with the army, navy, air force, joint medical service and joint support service.

13,500 German soldiers and civilian contractors currently dealing with cyber defense from a number of different locations will be brought together under  a single entity. The Bundeswehr (German army) is also desperately seeking IT specialists in the labor market. It is currently running elaborate advertising campaigns in order to pitch the army as an attractive and modern IT employer.

The costs of data breaches for South African companies continues to rise, with an increase of 12% in 2017 compared to 2016.


Source –

LAWtrust recommends South African businesses and individuals take the following steps to protect themselves from Petya and similar cyber attacks:

  • Keep your operating system and your applications up to date
  • Organisations must raise awareness among staff with regard to information security
  • Treat email communication carefully – especially unsolicited emails. Do not open links or attachments if you do not know what these are. Confirm with the email sender if needed
  • Back up your data regularly and have a recovery plan in place
  • Encrypt your sensitive data, especially the private data of clients
  • Put measures and technology in place to help your clients be able to identify emails and documents originating from your organisation (such as use of digital signatures, email encryption, secure portals, etc.)

Source – https://www.iol.co.za/business-report/wanted-cyber-army-to-defend-cyber-attacks-9147750


About Erasmus Laura

I am a creative social media professional with expertise in digital content strategy development, social media analyst, reputation management, account maintenance, and marketing. I have gained valuable online experience creating innovative, creative and exciting social media accounts that grow client audiences and create brand awareness. I have managed multiple campaigns simultaneously with a focus on traffic generation by creating viral content, syndicating it to social networks, and optimizing for various web applications. One of my specialties is that I am an Organisational Development Specialist and my holistic and creative efforts are focused on the establishment of valuable networks that in the end will generate revenue.

Leave a comment