With an established Information Regulator in South Africa the commencement of the South African Protection of Personal Information Act – or POPIA as it is commonly known – from 1 July 2021, has legal grounds to compel and take punitive actions on any South African found to be negligent with personal data.

This forces South African businesses and organizations of all sizes to review, assess and in most cases, improve their current data security procedures and practices to mitigate risks to become (and remain) compliant.

The news is rife with high-profile examples of data breaches in South Africa and while the press gives the most coverage to black hat breaches stemming from hacking and malware intrusion, in truth, data from Privacy Rights Clearinghouse finds that for more than a decade – in fact since 2005, a full two-thirds of breaches have resulted from user/employee oversight or malfeasance including lost and stolen PCs, mobile devices and electronic storage devices.

One example is Healthcare provider Premier Healthcare which reported the theft of a laptop containing the sensitive personal and clinical information of over 200,000 patients.

A stolen laptop or a misplaced USB storage device for example could result in exposed records which might consist of identity numbers, usernames and passwords, financial or medical information, corporate intellectual property, child information, client lists, and other digital information that amounts to a violation of privacy and puts individuals and organizations at risk for identity fraud and losses.

It is important to know that while data breaches of larger magnitudes grab headlines, it is actually the Sole Proprietor and Small to Medium-sized businesses that can suffer the most harm from them.

For the Sole Proprietor and SMBs with less capacity to absorb hardships than larger enterprises, the reputational damage, financial pressure of a large regulatory fine, or loss of intellectual property from a data breach can be a devastating – and sometimes fatal – blow.

How can DLS help you to mitigate this risk?

As an authorized Beachhead MSP partner in South Africa, we bring you BeachheadSecure™

There is no costly hardware or software required, nor internal IT staff necessary to deploy and manage BeachheadSecure for you. BeachheadSecure , is a powerful cloud-based tool to secure your devices at an affordable monthly service.

This frees you up to do what you do best – run your business!

Device security and encryption compliance couldn’t be easier! DLS can remotely deploy and secure vulnerable devices in your organization, including those devices owned by your employees. Whatever the quantity and mix of Windows and Mac PCs, iPhones, iPads, Android devices, or USB Storage devices, we will easily configure, manage and secure your devices. Modules can be easily added and managed to your inventory of protected endpoint devices, if and when you need them.

While encryption serves as baseline security, additional data protection including remote data wipe, data quarantine, system shutdown, and authentication revocation are available, all it takes is a phone call to DLS to expand your service requirements and/or implement a security rule.

BeachheadSecure Managed – This is what we do

BeachheadSecure All Platforms – On what devices can you install BeachheadSecure?

A Picture say more than a thousand words.

Information Library

Futured Article

The Importance of PC and Device Encryption for South African Organizations.

AccountantsCall Centre’sDebt Collectors and Bureaus
Disaster RecoveryFinancial ServicesHealthcare
Law FirmsLogistics, Transportation and Courier CompaniesMining Sector, Manufacturing and Industrial Sectors
NGO’sProperty Management

–Body Corporates, Trustees, Estate Agents, Property Management agents
Service Providers



6 Steps for Effective and Secure Remote Worker Readiness