Business Report Economy

Data breaches in South Africa occur every three hours, with 90% deemed preventable

Ashley Lechman|Published

In a country where data breaches now strike every three hours, the pressing need for robust cybersecurity measures has never been clearer. With 90% of these breaches classified as preventable, the time for organisations to act is now. Discover how South Africa can safeguard its digital future amidst a wave of cyber threats.

Image: Ron AI

Data breaches in South Africa are occurring at a staggering rate of one incident every three hours, with a significant 90% of these breaches classified as preventable.

This situation poses a serious concern for organisations across the country that are facing relentless cyber threats.

This was according to Unit 42, Palo Alto Networks' elite threat intelligence division, which indicated that the global time frame between a network intrusion and data theft has shrunk dramatically to an average of 72 minutes.

This is a sharp reduction from 285 minutes recorded in 2024, highlighting the increasingly frenetic pace of cybercrime.

Recent data indicated that South African organisations bore the brunt of a 60% rise in data breaches during the first half of 2025, compounding the difficulty of mitigating these threats.

As the South African government leans into its digital future through the Cabinet-approved Roadmap on the Digital Transformation, the proposed MyMzansi platform is intended to enhance e-government services.

While strides in digital governance have landed South Africa in 40th place in the UN e-Government Index, the broadened digital landscape simultaneously increases the points of vulnerability for potential cyberattacks.

According to the findings from Unit 42's analyses of over 750 significant global incidents across 50 countries, the driving force behind these breaches is not the sophistication of the attackers but rather the fragmentation of an organisation’s cyber defences.

In an overwhelming 87% of cases examined, responders reported that they were forced to sift through evidence from two or more systems to trace the breach, a clear indication that the prevailing complexity of security infrastructures is sabotaging effective responses.

“Most South African organisations have invested significantly in security,” said Justin Lee, Regional Director for Southern Africa at Palo Alto Networks.

“However, these investments have made things more complicated rather than more secure. Complexity is the enemy of speed, and right now, complexity is winning.”

On average, South African organisations juggle around 57 security tools from 16 different vendors, more than double the global average. As nearly two-thirds of cybersecurity positions remain unfilled, the burden on small teams is intensifying, while fragmented procurement cycles within the public sector exacerbate the challenge of streamlining security systems.

The threat landscape is evolving 

The 2026 Unit 42 Incident Response Report signals a growing trend of nation-state actors embedding themselves within critical infrastructure, shifting from mere espionage to more tactical pre-positioning.

For a logistical nexus like South Africa, this shift threatens critical sectors such as ports, utilities, and transport networks.

“We are witnessing actors targeting the operational technology layers of vital infrastructure. These systems often rely on outdated technologies that resist easy updates," Lee said. 

Furthermore, identity-related weaknesses were implicated in nearly 90% of the breaches investigated by Unit 42, with a separate analysis revealing that 99% of cloud accounts held greater access than necessary.

For government bodies that manage sensitive citizen data, these unmanaged accounts present a severe risk.

“If someone leaves the organisation and their account remains active six months later, that’s an open door,” Lee warned. “Attackers are adept at seeking out such vulnerabilities.”

Organisations that are navigating this challenging cybersecurity environment effectively are those that have simplified their infrastructures.

By consolidating onto fewer, integrated platforms and automating routine response processes, they are better positioned to maintain consistent visibility across their operations.

“Platformisation is not about discarding everything and starting anew. The aim is to cultivate a security environment straightforward enough to manage and swift enough to respond,” Lee added. 

The long-term imperative of quantum readiness is also becoming increasingly pressing.

As computational capacities expand, the encryption standards considered secure today might not withstand future scrutiny.

For organisations bound by the data protection mandates of the Protection of Personal Information Act (POPIA) and the Cybercrimes Act, establishing flexibility in cryptographic frameworks is transitioning from a best practice to a necessity.

“This complexity requires a proactive approach. Identifying where sensitive data resides and how it is encrypted is crucial—if you fail to enable the ability to swap out encryption methods now, retrofitting this capability later could prove exorbitant,” Lee said. 

The financial implications of cybercrime are staggering, with Interpol estimating that South Africa incurs losses of approximately R2.2 billion annually due to cyber incidents.

Furthermore, the Information Regulator receives around 284 breach notifications every month. Yet, with over 90% of breaches arising from preventable vulnerabilities, Lee highlights a clear path for improvement.

“Understanding the problem offers a strategic advantage, we have the opportunity to make meaningful changes toward stronger cybersecurity.”

These pressing issues were at the centre of discussions at the inaugural IGNITE on Tour event held in Johannesburg, where Palo Alto Networks introduced its global security leadership forum to South Africa for the first time.

Follow Business Report on Facebook, X and on LinkedIn for the latest Business and tech news.

BUSINESS REPORT