Protecting Your Microsoft-Based Infrastructure When It Matters Most
SACYBER – Your Partner in Cybersecurity
SACYBER – Your Partner in Cybersecurity
SACYBER specializes in providing comprehensive cybersecurity solutions for small and medium-sized businesses. Services include Security Maturity Assessments using CIS Controls v8, Virtual Chief Information Security Officer (v-CISO) services, Managed Detection and Response (MDR) services, Major Incident Management, and consulting on Microsoft Managed Extended Detection and Response (MXDR) suite. These offerings enhance cybersecurity posture, provide expert leadership, and protect your business from cyber threats.
South Africa’s Prudential Authority (PA) and FSCA now require financial institutions to comply with Joint Standard 2 of 2024. Non-compliance can mean fines, regulatory intervention, and loss of customer trust.
SACYBER helps you get board-level visibility and practical compliance without the confusion.
The definition of a financial institution under the Joint Standard 2 of 2024 is comprehensive, covering a wide range of entities in the financial sector. Both large organizations and smaller independent financial advisors are required to comply with the new cybersecurity regulations to ensure the overall security and resilience of the financial systems.
Please reach us at info@sacyber.co.za if you cannot find an answer to your question.
Joint Standard 1 of 2023 (JS1) applies to all financial institutions regulated by the Prudential Authority (PA) and the Financial Sector Conduct Authority (FSCA). This includes:
👉 If your business is licensed, supervised, or regulated by the PA or FSCA, you are impacted.
📌 Even if you’re a smaller financial services business (like an FSP or fintech), you’re not exempt — the expectations scale with size, but the requirements still apply.
Yes. Under JS2, the Board is accountable for cybersecurity resilience. They must receive regular briefings and approve the organisation’s cybersecurity strategy.
It’s a formal plan that aligns your cyber defences with your business objectives. It should include risk management, controls, monitoring, and governance.
A Cyber Risk Register is a living document tracking your threats, vulnerabilities, and mitigation measures. Regulators expect you to maintain and update this regularly.
Yes. A written plan alone is not enough. JS2 requires that you test your incident response capability, often through tabletop or live exercises.
Third-party risk management is a key requirement. You need documented processes to evaluate and monitor vendors who access or process sensitive information.
Yes. Training and awareness must extend from staff to management and the Board. Everyone should understand their role in maintaining resilience.
JS2 requires clear lines of reporting. You’ll need templates and processes for providing evidence to the Prudential Authority (PA) and FSCA when requested.
In response to the increasing threat of cyber attacks, the Financial Sector Conduct Authority (FSCA and Prudential Authority (PA) have introduced Joint Standard 2 of 2024. This standard mandates comprehensive cybersecurity and cyber resilience measures for all financial institutions, including small independent advisors and insurance brokers.
At SACYBER, we specialize in helping small businesses navigate and comply with these regulations. Our services are designed to ensure that your business meets the required cybersecurity standards efficiently and effectively.
With years of experience in the cybersecurity field, our experts and partners are well-equipped to handle the unique challenges faced by small businesses in the financial sector
Develop and maintain a cybersecurity strategy that is regularly reviewed and aligned with the overall business strategy.
Identify business processes and information assets that support business and the delivery of services, conduct risk assessments on its critical operations and information assets and maintain an inventory of all its information assets. Implement appropriate and effective cybersecurity practices to prevent the impact of potential cyber incidents.
Report material cyber incidents to the FSCA, PA, and potentially the Information Regulator if personal data is compromised.
Manage user access to your systems and applications with our identity and access management solutions. Our solutions ensure that only authorized users can access your systems and that their access is limited to what they need to do their jobs.
Ensure the protection of personal and sensitive data as required by POPIA, including notification of data subjects in the event of a breach. EDR solutions Antivirus, and remote wipe capabilities.
Assess your cybersecurity risks and develop a comprehensive risk management plan with our cybersecurity risk assessment solutions. Our team of experts will help you identify your risks and develop a plan to mitigate them.
Maintain effective cyber resilience capabilities to monitor, detect, respond and recover from cyberattacks on IT systems. Establish a data backup strategy to ensure that any sensitive information stored in the backup media is secured.
Test and apply security patches to address vulnerabilities in IT assets. Maintain written security standards for hardware and software configurations to minimise exposure to cyber threats. Implement endpoint protection to prevent malware infection..
If you need further information or would like us to get in touch, send us a message, and we will get back to you soon.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.