• Engaging with effective governance

      Giving South African municipalities access to the tools and technologies it needs to thrive, was the driving force behind BCX SOLAR. Giving South African municipalities access to the tools and technologies it needs to thrive, was the driving force behind BCX SOLAR.

      Mining Sector

      Increase productivity & build a culture of innovation

      Financial Sector

      Meet the challenges of disruption & cyber security

      Healthcare Sector

      Empower your patients & leverage data by deploying customised solutions

      Retail Sector

      Embrace the changing retail landscape & know your customer

      Government Sector

      Use digital transformation to grow the economy & build capacity

      Industries Overview >

    • Cloud
      Reimagine success

      Accelerate your business ambitions with cloud computing solutions from BCX.

      Digital Innovation Awards

      BCX Digital Innovation Awards

      Cloud

      Computing for today & the future

      Digital Transformation

      Intelligent systems upgrading

      Analytics

      Data that works for you

      Applications

      Tools to streamline operations

      Services

      Strategies for efficient ICT
      Healthcare Solutions

      Healthcare Solutions

      Applications for healthcare
      BCX ERP Solutions

      SOLAR ERP Solutions

      Connect, integrate, and optimise

      Security

      Protection for your critical systems

      Devices

      Processes & network foundations

      Connectivity

      Connections within & without

      Partners

      Partnerships moving business forward
      BCX HR and Payroll

      HR and Payroll Solutions

      Everything to manage people & payroll
      Software Testing-as-a-Service

      Software Testing-as-a-Service

      Your pathway to zero-defect software

      Solutions Overview >

    • Our Offices
      BCX Head Office
      1021 Lenchen Avenue North
      Centurion, Gauteng
      South Africa
      0157
      Botswana

      Botswana

      Mozambique

      Mozambique

      Namibia

      Namibia

      Zambia

      Zambia

      UK

      United Kingdom

      Our Global Footprint Overview >

    • Speak To An Expert
      We'll need just a few details from you, and one of our specialists will be in touch as soon as possible.
      BCX HEAD OFFICE

      Employee Entrance:

      1021 Lenchen Avenue North
      Centurion
      Gauteng
      South Africa
      0157

      Visitors Entrance:

      1266 South Road
      Centurion
      Gauteng
      South Africa
      0157
Overlooked vulnerabilities that open the door to cyberattacks
Home > Overlooked vulnerabilities that open the door to cyberattacks

Overlooked vulnerabilities that open the door to cyberattacks

20 October, 2025
Hackers and cyberattackers don’t always need to use high-tech hacking tools to access corporate networks and sensitive data. Sometimes, they just pass through gateways left wide open by carelessness or error.

This is according to Chris Bester, Consultant in Cybersecurity Management & Governance at BCX, who says many breaches don’t happen because of sophisticated zero-day attacks, but rather because of small, everyday slips-ups.

Speaking during a Cybersecurity Awareness month podcast hosted by BCX, Bester noted that many common under-the-radar vulnerabilities are exploited by cybercriminals – from using public Wi-Fi, unprotected personal devices and weak passwords, to vulnerable home networks used by remote employees.

“Unfortunately, convenience often trumps vigilance. People plug a phone in anywhere to charge it, or make use of the Wi-Fi because it’s free. Combating it comes down to education. Corporates must make vigilance part of their culture,” he says. 

“The man in the street is often ignorant of the need for basic protection, and is unwilling to pay for it. There are some horror stories on the internet about what happens when people aren’t vigilant.

People don’t think about the risks of not securing their home networks, or plugging their corporate device into their home network.’

Soaring cybercrime 

Bester says that cyberattacks don’t just affect corporations – they can have a direct impact on human lives. For example, when attackers target infrastructure like water-processing plants.

Interpol reports that cybercrime – and ransomware in particular – has soared in Africa in the past year. The 2025 Interpol Africa Cyberthreat Assessment Report finds that online scams, particularly phishing, are the most frequently reported cybercrimes among Interpol member countries in Africa, while ransomware and business email compromise remain widespread. 

Between 2019 and 2025, cyber-incidents across the continent resulted in estimated financial losses of over $3 billion, with the finance, healthcare, energy and government sectors among the hardest hit.

This is in line with global trends, with cybercrime proliferating worldwide, partly due to efficiencies criminals have gained by using automation and artificial intelligence (AI) to help carry out their attacks.

Despite the new technologies available to cybercriminals, human error and a lack of basic cyber-hygiene remain prime reasons why organisations fall victim to cybercrime.

While many organisations keep details of attacks under wraps, South Africa has seen a number of noteworthy attacks in recent years. 

In June this year, a ransomware attack on South Africa’s National Health Laboratory Service disrupted patient care and medical decision-making for some time after the attack. The attack was apparently launched via a phishing email.

The South African Weather Service suffered serious disruptions due to a hack of its systems earlier this year, also reportedly after a phishing attack.

Earlier this year, Pam Golding’s CRM system was breached via a user account, and personal information was leaked.

Overseas, a particularly noteworthy Business Email Compromise (BEC) attack saw a finance worker at a multinational engineering company in Hong Kong paying over $25 million to fraudsters after a videocall in which deepfakes of his senior colleagues instructed him to do so.

Attacks like these can cost organisations dearly in direct financial losses, remediation costs, downtime and reputational damage, Bester says.

Common risks to businesses

Bester highlighted several areas that are often overlooked, yet could put organisations at risk of cyberattacks.

“There’s quite a debate around passwords, and big players are moving to have biometric backup for identity management. There’s also a profound shift towards a passwordless environment and future-proofing identity,” Bester notes.

In remote work environments, routers with default credentials and IoT devices with poor security pose risks when people work from home. 

BYOD (bring-your-own-device) policies put potentially unsecured devices on the corporate network, giving them access to sensitive data within the organisation. Accountability, and moving protection to the network layer could help mitigate these risks, Bester said.

Employees working on-the-go using public Wi-Fi can put the business at risk through Wi-Fi eavesdropping, “evil twin” hotspots and session hijacking.

USB drives also pose a threat to organisations, presenting risks like malware infections, data theft, and unauthorised access.

Legacy technology such as old laptops, servers and even printers may still be connected to company networks, but because they are no longer in use, they are forgotten and are not patched and up to date. In addition, smart devices such as air conditioners and CCTV systems may be overlooked as security risks, even though they are connected to the organisation’s networks. 

Weak or reused passwords are another vulnerability, Bester says. Many people reuse the same password for all applications, or use short or insecure passwords, and businesses can’t always control this. Password managers and two-factor authentication can reduce the risk of weak passwords, while a Zero Trust approach – in which organisations implement least privilege access control – is becoming the preferred method for reducing risks due to weak or stolen login credentials.

Everyday digital hygiene

Podcast host Garith Peck, Managing Executive of Cybersecurity at BCX, comments: “It’s everyday digital habits that quietly shape our digital resilience. The future of cybersecurity won’t just be decided by new technologies, AI or Zero Trust – it will depend on how consistently we get the basics right. Digital hygiene is about the small, repetitive actions that create resilience over time.”

He highlighted basic cybersecurity hygiene measures to address overlooked vulnerabilities:

    • Use strong, unique passwords, or consider a password manager.
    • Enable multi-factor authentication wherever it’s available.
    • Keep all device software and firmware up to date. 
    • Keep a comprehensive asset register, including all devices connected to the network, and ensure that all digital assets are patched and up to date.
    • Avoid doing sensitive work (banking, confidential login) over public Wi-Fi. If you must, use a VPN.
    • Secure your home Wi-Fi: change default router logins, update firmware, and separate IoT devices on a different network if possible.
    • Be careful of the apps you install; review all permissions before installing them.
    • Back up your data regularly and ensure backups are secure and immutable.
    • Don’t use AI platforms such as ChatGPT to process or summarise sensitive company information.

“It’s the small things done consistently that make the difference in many things, particularly cybersecurity,” Bester comments. 

Pick one hygiene tip that we’ve shared and implement it. Maybe update your router’s firmware, or change a weak password, and keep working towards better cybersecurity.

To listen to the full podcast, go to https://bcx.dev.treemind.solutions/bcx-connects/

Share

SPEAK TO AN EXPERT

 We'll just need a few details from you, and one of our specialists will be in touch.

Consent
Please read our Privacy Statement & Consent Clause to understand what happens to your personal information.

RELATED POSTS