Dubai: Emerging technology paradigms such as the Internet of Things (IoT), which is defined as the network of devices that are connected to the internet and can be controlled remotely, are expected to add $14 trillion to the world’s 20 largest economies by 2030. That’s one fifth of current global GDP.

Necip Ozyucel, Cloud and Enterprise Solutions Lead at Microsoft Gulf, said there is no doubt that the future of humankind is digital. But in the Middle East and Africa, many businesses are held back from fully realising digital transformation because of a lack of a robust and agile IT security policy.

According to researchandmarkets.com, in 2015, half of all GCC organisations were subjected to distributed denial-of-service (DDoS) attacks, where websites and applications are taken offline by massive volumes of external resource requests. In the same period, 45 per cent of UAE social media users were victims of cyber crime.

This threat climate is expected to lead to a surge in spending, where the GCC cybersecurity market will grow to an estimated $10.41 billion by the end of 2022.

The question on many CEOs’ minds is: How do I bridge the gap between innovation and security?

Ozyucel said that headline-grabbing cyber attacks are on the rise. This trend is deterring some businesses from adopting new technologies like “cloud computing” that accelerate digital transformation.

“These new technologies are built around safety, security and privacy. Trusted technology brands spend millions of dollars on secure architecture that supports data encryption, both at rest and in transit; identity and access management; and trained security professionals who monitor infrastructure and react quickly and responsibly to events,” he said.

The fact that banks are leading the digital revolution, particularly in the Middle East and Africa, where customers demand innovative and mobile banking services, is a sure sign of trust.

In the Middle East, Ozyucel said that 100 per cent of medium-sized banks are ready to adopt a mobile technology this year, and 65 per cent of banks are implementing private cloud technology now or are planning to deploy it within 12 months.

Sub-Saharan Africa accounts for 53 per cent of all mobile money transfers in the world. In Kenya, $36 billion in mobile transactions are conducted each year. Among Gulf countries, according to a 2015 report from Ernst & Young, mobile banking usage in the UAE stands at 34 per cent, followed by 27 per cent in Kuwait, 19 per cent in Qatar and 15 per cent in Saudi Arabia.

Gartner estimates that between now and 2020, 95 per cent of cloud security breaches and failures will be the fault of the customer rather than the provider.

“It’s not just the IT department that must adapt, but the entire organisation,” Ozyucel said.

A new Capgemini report refers not to digital readiness, but to “digital dexterity”. This is an organisation’s capacity to self-organise to deliver new value from digital technologies, he said.

Firstly, he said that consider how the IT department operates. Security should no longer operate as a siloed IT function, but as a fundamental business process that is aligned to business objectives. It’s critical that businesses embed security across their entire network, applications and access points to detect, analyse and block suspicious behaviour.

Even if firms have the most watertight systems and processes in place, he said that a lack of “security awareness” among employees can be a serious risk.

“Most breaches today are the result of simple mistakes by employees clicking on rogue links in emails, downloading malicious attachments, or simply not following security policies and training lessons,” says Paul Fisher, research director of Pierre Audoin Consultants, which conducted research into the role identity and access management play in digital transformation.

Digital transformation touches everything. The Internet of Things is a concept in which machines, buildings, tools and other pieces of equipment are fitted with sensors designed to capture real-word data that is transmitted to intelligent software platforms, enabling “things” to learn and adapt with human-like intelligence.

Many industries and companies are adopting this model to gain an edge over their competition. But IoT means infinitely more data being stored, and more employees with access to sensitive information. A planned and secure IT infrastructure will ensure that all this data can be controlled and managed centrally.

“Organisations may think that strong security measures through processes and systems mean they have to forfeit agility. This is not true. With an intelligent cloud server you can be both agile and secure,” Ozyucel said.

More than 80 per cent of attacks target a known vulnerability that could have been prevented with an existing patch. Ozyucel said that cloud computing enables the latest patches to be delivered to an organisation’s IT system every day, or as soon as a new vulnerability is detected.

“An organisation building its own secure data centre could spend up to $1 million to set it up, not to mention the number of highly-skilled specialists that would be needed round the clock to run such an operation. With cloud, this is all taken care of by the vendor who can afford the best experts in the field, providing customers with a scalable, pay-as-you-go model, without the stress,” he said.

In addition to managing their own security, he said that companies have a role to play in creating a more trusted internet environment for everyone. Ultimately a digitally competitive company needs digitally savvy consumers with a high level of trust in the digital world.

He said that companies have an opportunity to partner with the public sector to educate citizens on policies and legislation affecting cyber crime, in addition to establishing security principles and commissioned studies to identify factors that increase online risks.

“Companies should pledge to be transparent with customers’ data, and organisations should share threat intelligence. This is being done by banks, which have a high level of sharing with their competitors,” he added.