{"id":145978,"date":"2023-07-20T14:23:49","date_gmt":"2023-07-20T08:53:49","guid":{"rendered":"https:\/\/www.regenesys.net\/reginsights\/?p=145978"},"modified":"2025-11-18T17:05:51","modified_gmt":"2025-11-18T11:35:51","slug":"navigating-the-rising-tide-of-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats","title":{"rendered":"Navigating the Rising Tide of Cyber Threats"},"content":{"rendered":"<p>In recent times, cyberattacks worldwide have become increasingly prevalent, and cyber criminals show no signs of relenting. In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity. For leaders, the question is not merely about caring for cybersecurity\u2014it is about survival, reputation, and staying one step ahead of cyber adversaries.<\/p>\n<p>In the face of these escalating challenges, leadership finds itself at the heart of the cybersecurity battlefield. Strong leadership is not merely an option; it becomes the linchpin of a successful defence strategy. Now more than ever, visionary leaders must champion a culture of cybersecurity awareness, resilience, and proactive measures.<\/p>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Data-breach.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145980\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Data-breach.png\" alt=\"data breach\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Data-breach.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Data-breach-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<p>Recent reports have borne witness to countless high-profile cases where data breaches have shaken industries to their core, leaving businesses to grapple with a pressing question: Are they truly safe? As the spectre of cyber threats looms large, how can organisations ensure that they won&#8217;t face the same fate? In this article, we\u2019re going to look at cyberattacks that happened recently and the lessons we can learn from them.<\/p>\n<h3>Recent Cyberattacks Experienced by Companies<\/h3>\n<p>Many companies have fallen victim to all sorts of cyberattacks. Let\u2019s take a look at companies that have recently experienced this and lessons to learn from them:<\/p>\n<ul>\n<li>T-Mobile<\/li>\n<\/ul>\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/t-mobile-discloses-2nd-data-breach-of-2023-this-one-leaking-account-pins-and-more\/\">T-Mobile<\/a>, a wireless telecommunications services company had two data breaches in 2023. The company announced its first cybersecurity incident in January where personal data of 37 million customers was exposed. The second one was in April where 836 customers were exposed.<\/p>\n<p>According to <a href=\"https:\/\/www.securitymagazine.com\/articles\/99300-t-mobile-confirms-second-data-breach-in-2023#:~:text=On%20April%2028%2C%20T%2DMobile,most%20recent%20incident%20affected%20836.\">Security Magazine<\/a>, Claude Mandy, Chief Evangelist, Data Security at Symmetry Systems said she was disappointed to see yet another T-Mobile data breach \u2014 regardless of the number of customers impacted. She further stated that organisations like T-Mobile need to provide more detailed analysis on the technical cause of the data breach \u2014 by providing a more detailed analysis, which would help the entire industry to take proactive steps to avoid similar issues.<\/p>\n<ul>\n<li>Dis-Chem<\/li>\n<\/ul>\n<p>In May 2022, South African pharmacy retail Dis-Chem experienced a cyberattack through its third-party service provider, resulting in the compromise of data belonging to over 3.6 million South Africans, this is according to <a href=\"https:\/\/www.itweb.co.za\/content\/PmxVE7KEABOqQY85\">ITWeb<\/a>. Upon becoming aware of the incident, Dis-Chem initiated an immediate investigation to prevent any further breaches. They have also notified affected individuals in accordance with section 22 of <a href=\"https:\/\/www.law.regenesys.net\/understanding-the-protection-of-personal-information-act-popia\/\">POPIA<\/a> (Protection of Personal Information Act) and confirmed that unauthorised access to certain personal information occurred around April 28, 2022.<\/p>\n<p>Dis-Chem said it is actively monitoring the web, including the dark web, with the help of external specialists to detect any potential publication of the compromised personal information.<\/p>\n<ul>\n<li>Showmax<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/showmax.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145981\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/showmax.png\" alt=\"cyberattacks\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/showmax.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/showmax-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<p>In June 2023, streaming service Showmax fell victim to hackers who targeted and published login credentials of approximately 27,000 subscribers on a fake website. Showmax clarified that the data was not stolen from their system but might have been obtained from other sources. According to <a href=\"https:\/\/www.iol.co.za\/entertainment\/tv\/streaming\/showmax-confirms-cyber-attack-compromised-subscribers-details-c0de96a3-8056-4a8c-9c7e-81975499f4bd\">IOL<\/a>, the company assured customers that their financial information remains secure and stated that their investigation revealed compromised email addresses and passwords.<\/p>\n<ul>\n<li>ChatGPT<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.electric.ai\/blog\/recent-big-company-data-breaches\">ChatGPT<\/a>, renowned for its groundbreaking AI capabilities, came under public scrutiny following a data breach in late March. The breach exposed certain user information, prompting OpenAI, the parent company of ChatGPT, to swiftly take the platform offline and implement remedial actions. Users affected by the breach were promptly notified and provided with additional security measures. This incident underscores the growing importance of implementing robust security protocols to safeguard the increasing number of AI tools that play a significant role in simplifying our lives.<\/p>\n<p>These examples are just a few among many incidents that have occurred over the years. Numerous organisations, including government agencies, healthcare institutions, schools, NGOs, and others, have fallen victim to cyberattacks. The pervasive nature of these incidents serves as a stark reminder that no organisation is exempt from such risks. Whether an entity maintains an online presence or collects customer data, cybersecurity breaches can potentially impact any organisation, underscoring the imperative for implementing robust protective measures and preparedness.<\/p>\n<h3>What can we Learn from these Incidents?<\/h3>\n<ul>\n<li>Transparency and Trust: Be transparent in times of crisis as it builds trust, fosters credibility, and demonstrates accountability, even during challenging situations.<\/li>\n<li>Proactive communication: Proactively informing stakeholders about the incident, its impact, and the measures being taken to address the breach can help manage the situation and prevent misinformation.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/proactive-comm.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145982\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/proactive-comm.png\" alt=\"cyberattacks\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/proactive-comm.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/proactive-comm-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<ul>\n<li>Detailed analysis: As an organisation, cybersecurity teams should be encouraged to conduct thorough and detailed analyses of any security incidents that occur. Understanding the technical causes of a breach allows for targeted improvements to prevent similar attacks in the future.<\/li>\n<li>Cybersecurity Training for Staff: Cyberproofing your staff is critical in the fight against cyber threats. Provide regular <a href=\"https:\/\/www.digitalregenesys.com\/all-courses\/cyber-security\">cybersecurity<\/a> awareness and training programmes to all employees, ensuring they understand potential risks, recognise phishing attempts, and practice safe online behaviour. Educated staff becomes an essential line of defence against cyberattacks.<\/li>\n<\/ul>\n<p>By implementing these practices, organisations can strengthen their cybersecurity posture and better protect themselves from cyber threats.<\/p>\n<h3>What are the Current Trends of Cyberattacks?<\/h3>\n<p>As a leader, knowing what the trends are, will help keeping your organisation safe. Here are the top trends for 2023:<\/p>\n<ul>\n<li>Ransomware attacks: Ransomware attacks have gained prominence due to their lucrative nature, enabling cybercriminals to demand ransom payments from victims by encrypting their computer files.<\/li>\n<li>Application Security: The pandemic-induced shift of businesses to the online realm has led to a significant surge in application security spending, estimated to surpass $7.5 billion, as reported by <a href=\"https:\/\/www.statista.com\/statistics\/1345106\/global-spending-on-application-security\/\">Statista<\/a>. However, no application is immune to risks like hacking, zero-day attacks, or identity theft. Guaranteeing application security entails writing secure code, designing secure application architecture, implementing robust data entry verification, and promptly addressing vulnerabilities to avert unauthorised access or modification of application resources.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/AI-in-cyberattacks.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145983\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/AI-in-cyberattacks.png\" alt=\"cyberattacks\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/AI-in-cyberattacks.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/AI-in-cyberattacks-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<ul>\n<li>AI in cyberattacks: AI-driven attacks can adopt diverse strategies, including phishing emails, malware, and social engineering scams. By utilising AI, attackers can create exceptionally persuasive phishing emails that imitate trusted sources, effectively deceiving users into clicking on malicious links or downloading harmful software.<\/li>\n<li>Users as an attack surface: A notable cybersecurity trend anticipated in 2023 involves a heightened emphasis on users as an attack surface. Cyber attackers will persist in targeting an organisation&#8217;s user base through tactics such as phishing, social engineering, and other means to gain unauthorised access.<\/li>\n<\/ul>\n<h3>Industries that Are Prone to Cyberattacks<\/h3>\n<p>According to <a href=\"https:\/\/www.embroker.com\/blog\/cyber-attack-statistics\/\">Embroker,<\/a> the following are the industries that are most vulnerable to cyberattacks:<\/p>\n<ul>\n<li><strong>Banks and Financial Institutions: <\/strong>These organisations are at high risk due to their storage of sensitive data like credit card information, bank account details, and personal customer or client data.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/healthcare.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145984\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/healthcare.png\" alt=\"cyberattacks\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/healthcare.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/healthcare-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<ul>\n<li><strong>Healthcare Institutions: <\/strong>Healthcare facilities are vulnerable targets as they store health records, clinical research data, and patient information, including social security numbers, billing details, and insurance claims.<\/li>\n<li><strong>Corporations: <\/strong>Companies are susceptible to cyberattacks due to the wealth of valuable data they hold, including product concepts, intellectual property, marketing strategies, client and employee databases, contract deals, client pitches, and more.<\/li>\n<li><strong>Higher Education: <\/strong>Educational institutions are targeted because they house enrolment data, academic research, financial records, and personally identifiable information such as names, addresses, and billing details.<\/li>\n<\/ul>\n<h3>Where Can You Train you and your Staff?<\/h3>\n<p><a href=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/training-staff.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-145985\" src=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/training-staff.png\" alt=\"data breach\" width=\"850\" height=\"357\" srcset=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/training-staff.png 850w, https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/training-staff-300x126.png 300w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.digitalregenesys.com\/\">Digital Regenesys<\/a> offers a <a href=\"https:\/\/www.digitalregenesys.com\/all-courses\/cyber-security\">cybersecurity programme<\/a> which can help you and your team be cyber-vigilant. Our programme will help you gain a deep understanding of cyber security principles &amp; concepts to stay ahead by working on projects, simulations, and cases. With this programme, you will get:<\/p>\n<ul>\n<li>International Recognition<\/li>\n<li>Cyber Security Governance and Compliance<\/li>\n<li>Cyber Risk Management<\/li>\n<li>Ethical Hacking and Penetration Testing<\/li>\n<\/ul>\n<p>For more on how you can enrol or enquire, click <a href=\"https:\/\/www.digitalregenesys.com\/all-courses\/cyber-security\">here<\/a>.<\/p>\n<p>REFERENCES<\/p>\n<ol>\n<li>Digital Regenesys (2023). <a href=\"https:\/\/www.digitalregenesys.com\/all-courses\/cyber-security\">Certification Programme in Cybersecurity<\/a><\/li>\n<li>IT Web (2021). <a href=\"https:\/\/www.itweb.co.za\/content\/PmxVE7KEABOqQY85\">Over 3.6m records exposed in Dis-Chem cyber attack<\/a><\/li>\n<li>IOL (2023). <a href=\"https:\/\/www.iol.co.za\/entertainment\/tv\/streaming\/showmax-confirms-cyber-attack-compromised-subscribers-details-c0de96a3-8056-4a8c-9c7e-81975499f4bd\">Showmax confirms cyber attack compromised subscribers\u2019 details<\/a><\/li>\n<li>Times Live (2023). <a href=\"https:\/\/www.timeslive.co.za\/news\/south-africa\/2023-06-05-showmax-admits-number-of-subscriber-login-details-were-hacked\/\">Showmax admits number of subscriber login details were hacked<\/a><\/li>\n<li>Security Magazine (2023). <a href=\"https:\/\/www.securitymagazine.com\/articles\/99300-t-mobile-confirms-second-data-breach-in-2023#:~:text=On%20April%2028%2C%20T-Mobile,most%20recent%20incident%20affected%20836\">T-Mobile confirms second data breach in 2023<\/a><\/li>\n<li>ARS Technica (2023). <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/t-mobile-discloses-2nd-data-breach-of-2023-this-one-leaking-account-pins-and-more\/\">T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more<\/a><\/li>\n<li>The Hacker News (2023). <a href=\"https:\/\/thehackernews.com\/2023\/04\/top-10-cybersecurity-trends-for-2023.html\">Top 10 Cybersecurity Trends for 2023: From Zero Trust to Cyber Insurance<\/a><\/li>\n<li>Statista (2023). <a href=\"https:\/\/www.statista.com\/statistics\/1345106\/global-spending-on-application-security\/\">Application security spending worldwide from 2017 to 2023<\/a><\/li>\n<li>Data Science Dojo (2023). <a href=\"https:\/\/datasciencedojo.com\/blog\/top-cybersecurity-trends-2023\/\">Top 6 cybersecurity trends to keep an eye on in 2023<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>In recent times, cyberattacks worldwide have become increasingly prevalent, and cyber criminals show no signs of relenting. In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity. For leaders, the question is not merely about caring for cybersecurity\u2014it is about<\/p>\n","protected":false},"author":63,"featured_media":145979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[1,608],"tags":[],"country":[],"class_list":{"0":"post-145978","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-a-z-topics","8":"category-leadership-insights"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating the Rising Tide of Cyber Threats - RegInsights<\/title>\n<meta name=\"description\" content=\"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the Rising Tide of Cyber Threats - RegInsights\" \/>\n<meta property=\"og:description\" content=\"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats\" \/>\n<meta property=\"og:site_name\" content=\"RegInsights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RegenesysBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T08:53:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T11:35:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"357\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Neo Webb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RegenesysB\" \/>\n<meta name=\"twitter:site\" content=\"@RegenesysB\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neo Webb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats\"},\"author\":{\"name\":\"Neo Webb\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/348af7e194903d33e010354dbff099ad\"},\"headline\":\"Navigating the Rising Tide of Cyber Threats\",\"datePublished\":\"2023-07-20T08:53:49+00:00\",\"dateModified\":\"2025-11-18T11:35:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats\"},\"wordCount\":1352,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Features-Image-3.png\",\"articleSection\":[\"A - Z Topics\",\"Leadership Insights\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats\",\"name\":\"Navigating the Rising Tide of Cyber Threats - RegInsights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Features-Image-3.png\",\"datePublished\":\"2023-07-20T08:53:49+00:00\",\"dateModified\":\"2025-11-18T11:35:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/348af7e194903d33e010354dbff099ad\"},\"description\":\"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#primaryimage\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Features-Image-3.png\",\"contentUrl\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Features-Image-3.png\",\"width\":850,\"height\":357,\"caption\":\"cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/navigating-the-rising-tide-of-cyber-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the Rising Tide of Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#website\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/\",\"name\":\"RegInsights\",\"description\":\"Thought Leadership\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/#\\\/schema\\\/person\\\/348af7e194903d33e010354dbff099ad\",\"name\":\"Neo Webb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g\",\"caption\":\"Neo Webb\"},\"description\":\"Dip Media Practices Content Writer | Regenesys Business School Neo is a Content Writer at Regenesys Education with a passion for crafting engaging, purpose-driven content. She contributes to various Regenesys platforms, including the RegInsights blog and Regenesys Business World Magazine, focusing on leadership, education, and personal development. With a background in marketing communications, Neo brings creativity, strategy, and a strong sense of purpose to her work. Outside of the office, she\u2019s committed to using her voice to advocate for education, wellness, and opportunities for neurodivergent individuals.\",\"url\":\"https:\\\/\\\/www.regenesys.net\\\/reginsights\\\/author\\\/neo-webb\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the Rising Tide of Cyber Threats - RegInsights","description":"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats","og_locale":"en_US","og_type":"article","og_title":"Navigating the Rising Tide of Cyber Threats - RegInsights","og_description":"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.","og_url":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats","og_site_name":"RegInsights","article_publisher":"https:\/\/www.facebook.com\/RegenesysBusinessSchool\/","article_published_time":"2023-07-20T08:53:49+00:00","article_modified_time":"2025-11-18T11:35:51+00:00","og_image":[{"width":850,"height":357,"url":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png","type":"image\/png"}],"author":"Neo Webb","twitter_card":"summary_large_image","twitter_creator":"@RegenesysB","twitter_site":"@RegenesysB","twitter_misc":{"Written by":"Neo Webb","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#article","isPartOf":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats"},"author":{"name":"Neo Webb","@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/348af7e194903d33e010354dbff099ad"},"headline":"Navigating the Rising Tide of Cyber Threats","datePublished":"2023-07-20T08:53:49+00:00","dateModified":"2025-11-18T11:35:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats"},"wordCount":1352,"commentCount":1,"image":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#primaryimage"},"thumbnailUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png","articleSection":["A - Z Topics","Leadership Insights"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats","url":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats","name":"Navigating the Rising Tide of Cyber Threats - RegInsights","isPartOf":{"@id":"https:\/\/www.regenesys.net\/reginsights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#primaryimage"},"image":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#primaryimage"},"thumbnailUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png","datePublished":"2023-07-20T08:53:49+00:00","dateModified":"2025-11-18T11:35:51+00:00","author":{"@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/348af7e194903d33e010354dbff099ad"},"description":"In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity.","breadcrumb":{"@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#primaryimage","url":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png","contentUrl":"https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png","width":850,"height":357,"caption":"cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.regenesys.net\/reginsights\/navigating-the-rising-tide-of-cyber-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.regenesys.net\/reginsights\/"},{"@type":"ListItem","position":2,"name":"Navigating the Rising Tide of Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.regenesys.net\/reginsights\/#website","url":"https:\/\/www.regenesys.net\/reginsights\/","name":"RegInsights","description":"Thought Leadership","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regenesys.net\/reginsights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.regenesys.net\/reginsights\/#\/schema\/person\/348af7e194903d33e010354dbff099ad","name":"Neo Webb","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b89ff13d953aa189855645e1f90d0dbe718937f6aea0869a83996df5b718d5cb?s=96&d=mm&r=g","caption":"Neo Webb"},"description":"Dip Media Practices Content Writer | Regenesys Business School Neo is a Content Writer at Regenesys Education with a passion for crafting engaging, purpose-driven content. She contributes to various Regenesys platforms, including the RegInsights blog and Regenesys Business World Magazine, focusing on leadership, education, and personal development. With a background in marketing communications, Neo brings creativity, strategy, and a strong sense of purpose to her work. Outside of the office, she\u2019s committed to using her voice to advocate for education, wellness, and opportunities for neurodivergent individuals.","url":"https:\/\/www.regenesys.net\/reginsights\/author\/neo-webb"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"landscape":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"portraits":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-150x63.png",80,34,true],"medium":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-300x126.png",300,126,true],"large":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",770,323,false],"1536x1536":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"2048x2048":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"post-thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-270x180.png",270,180,true],"contentberg-main":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-770x357.png",770,357,true],"contentberg-main-full":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"contentberg-slider-stylish":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",850,357,false],"contentberg-slider-carousel":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-370x357.png",370,357,true],"contentberg-slider-grid-b":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-554x357.png",554,357,true],"contentberg-slider-grid-b-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-306x357.png",306,357,true],"contentberg-slider-bold-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-150x150.png",150,150,true],"contentberg-grid":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-370x245.png",370,245,true],"contentberg-list":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-260x200.png",260,200,true],"contentberg-list-b":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-370x305.png",370,305,true],"contentberg-thumb":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-87x67.png",87,67,true],"contentberg-thumb-alt":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-150x150.png",150,150,true],"gform-image-choice-sm":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",300,126,false],"gform-image-choice-md":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",400,168,false],"gform-image-choice-lg":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3.png",600,252,false],"web-stories-poster-portrait":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-640x357.png",640,357,true],"web-stories-publisher-logo":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-96x96.png",96,96,true],"web-stories-thumbnail":["https:\/\/www.regenesys.net\/reginsights\/wp-content\/uploads\/2023\/07\/Features-Image-3-150x63.png",150,63,true]},"rttpg_author":{"display_name":"Neo Webb","author_link":"https:\/\/www.regenesys.net\/reginsights\/author\/neo-webb"},"rttpg_comment":1,"rttpg_category":"<a href=\"https:\/\/www.regenesys.net\/reginsights\/category\/a-z-topics\" rel=\"category tag\">A - Z Topics<\/a> <a href=\"https:\/\/www.regenesys.net\/reginsights\/category\/leadership-insights\" rel=\"category tag\">Leadership Insights<\/a>","rttpg_excerpt":"In recent times, cyberattacks worldwide have become increasingly prevalent, and cyber criminals show no signs of relenting. In the treacherous realm of the digital age, cybersecurity stands as the guardian of trust, the shield against chaos, and the defender of organisational integrity. For leaders, the question is not merely about caring for cybersecurity\u2014it is about","_links":{"self":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts\/145978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/comments?post=145978"}],"version-history":[{"count":0,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/posts\/145978\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/media\/145979"}],"wp:attachment":[{"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/media?parent=145978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/categories?post=145978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/tags?post=145978"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.regenesys.net\/reginsights\/wp-json\/wp\/v2\/country?post=145978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}