ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Telkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the Telkom Group, Telkom Business operates from a head office located in Centurion, Gauteng, employing over 800 sales, marketing, product and support teams around the country. Positioned as the industry leader in telecommunications and ICT in South Africa, Telkom Business offers capability solutions across the technology spectrum. At Telkom Business, the world of Convergence is where IT and telecommunications meet in a seamless, synergistic relationship that can benefit any size of business. Show more Show less

Telkom Business A.I CyberSecurity Scoring

Telkom Business

Company Details

Linkedin ID:

telkom-business

Employees number:

10,001

Number of followers:

6,926

NAICS:

517

Industry Type:

Telecommunications

Homepage:

telkombusiness.co.za

IP Addresses:

0

Company ID:

TEL_2180102

Scan Status:

In-progress

AI scoreTelkom Business Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/telkom-business.jpeg
Telkom Business Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreTelkom Business Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/telkom-business.jpeg
Telkom Business Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Telkom Business Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Telkom Business Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Telkom Business

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Telkom Business in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Telkom Business in 2025.

Incident Types Telkom Business vs Telecommunications Industry Avg (This Year)

No incidents recorded for Telkom Business in 2025.

Incident History — Telkom Business (X = Date, Y = Severity)

Telkom Business cyber incidents detection timeline including parent company and subsidiaries

Telkom Business Company Subsidiaries

SubsidiaryImage

Telkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the Telkom Group, Telkom Business operates from a head office located in Centurion, Gauteng, employing over 800 sales, marketing, product and support teams around the country. Positioned as the industry leader in telecommunications and ICT in South Africa, Telkom Business offers capability solutions across the technology spectrum. At Telkom Business, the world of Convergence is where IT and telecommunications meet in a seamless, synergistic relationship that can benefit any size of business. Show more Show less

Loading...
similarCompanies

Telkom Business Similar Companies

Claro Brasil

Prazer, somos a Claro! Aqui, temos um grande time que faz tudo acontecer! É com o esforço e a dedicação de cada uma de nossas Pessoas que somos hoje referência no que fazemos, atuando unidos no nosso propósito, que é “Conectar para uma vida mais divertida e produtiva”. Somamos todas as tecnologias

Telecom Argentina

We are Telecom Argentina, a connectivity solutions and entertainment company with over 23,000 collaborators throughout the country. We transform the digital experience of our over 28 million customers providing them a secure, flexible and dynamic service on all of their devices, with high speed mobi

AT&T

We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

Totalplay

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion

Telkomsel

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity an

Axiata

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout

Airtel Africa

Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a

Bouygues Telecom

🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

Openreach

We’re the people that make the net work. As the nation’s largest wholesale broadband network, we’re rolling out Ultrafast Full Fibre broadband across the UK. It’s our fastest and most reliable broadband yet, and we’re well on our way to making it available to 25m homes and businesses – building the

newsone

Telkom Business CyberSecurity News

December 11, 2025 04:00 PM
A leaner BCX positions itself as market consolidator

BCX CEO Jonas Bogoshi is clear-eyed about the challenges and the opportunities facing the South African IT services provider.

December 05, 2025 05:31 AM
Telkom prioritises cybersecurity in South Africa’s digital era

Telkom is intensifying its cybersecurity strategy to protect South African businesses and consumers as digital threats escalate.

November 21, 2025 07:26 PM
Digicel Business and Symptai offer complimentary dark web scans for Cybersecurity Month

In recognition of Cyber Security Awareness Month, Digicel Business and Symptai are offering a complimentary dark web scan to Caribbean...

November 06, 2025 08:00 AM
Paratus Group, Roke Telkom join forces to launch Paratus Uganda

KAMPALA - In a move that underscores its ongoing expansion across Africa, the Paratus Group — a leading pan-African telecommunications and...

October 20, 2025 07:00 AM
Telkom Indonesia to spin off wholesale fibre connectivity business in $2.16 billion deal

Telkom Indonesia agreed on Tuesday to partially spin off its wholesale fibre connectivity business to its subsidiary Telkom Infrastruktur...

October 12, 2025 07:00 AM
Telkom SA Elevate Graduate Internship Programme 2025

Telkom SA SOC Limited, South Africa's leading information and communications technology (ICT) company, invites applications for its 2025...

October 08, 2025 07:00 AM
Businesses urged to patch software vulnerabilities

Safaricom has called on enterprises to urgently strengthen their cybersecurity platforms, warning that vulnerabilities are leaving many...

September 05, 2025 07:00 AM
MTN's Iran Billions Frozen--But a Telkom Comeback Deal Could Rewrite the Game

Sanctions lock up MTN's Middle East exit, while fresh M&A whispers reignite the battle for South Africa's telecom throne.

August 19, 2025 07:00 AM
South African businesses hit by 2,113 cyber attacks a week

Cybercriminal activity in South Africa increased by 14% between July 2024 and July 2025, with attack frequencies increasing to 2113...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Telkom Business CyberSecurity History Information

Official Website of Telkom Business

The official website of Telkom Business is http://www.telkombusiness.co.za.

Telkom Business’s AI-Generated Cybersecurity Score

According to Rankiteo, Telkom Business’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.

How many security badges does Telkom Business’ have ?

According to Rankiteo, Telkom Business currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Telkom Business have SOC 2 Type 1 certification ?

According to Rankiteo, Telkom Business is not certified under SOC 2 Type 1.

Does Telkom Business have SOC 2 Type 2 certification ?

According to Rankiteo, Telkom Business does not hold a SOC 2 Type 2 certification.

Does Telkom Business comply with GDPR ?

According to Rankiteo, Telkom Business is not listed as GDPR compliant.

Does Telkom Business have PCI DSS certification ?

According to Rankiteo, Telkom Business does not currently maintain PCI DSS compliance.

Does Telkom Business comply with HIPAA ?

According to Rankiteo, Telkom Business is not compliant with HIPAA regulations.

Does Telkom Business have ISO 27001 certification ?

According to Rankiteo,Telkom Business is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Telkom Business

Telkom Business operates primarily in the Telecommunications industry.

Number of Employees at Telkom Business

Telkom Business employs approximately 10,001 people worldwide.

Subsidiaries Owned by Telkom Business

Telkom Business presently has no subsidiaries across any sectors.

Telkom Business’s LinkedIn Followers

Telkom Business’s official LinkedIn profile has approximately 6,926 followers.

Telkom Business’s Presence on Crunchbase

No, Telkom Business does not have a profile on Crunchbase.

Telkom Business’s Presence on LinkedIn

Yes, Telkom Business maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telkom-business.

Cybersecurity Incidents Involving Telkom Business

As of December 14, 2025, Rankiteo reports that Telkom Business has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Telkom Business has an estimated 9,723 peer or competitor companies worldwide.

Telkom Business CyberSecurity History Information

How many cyber incidents has Telkom Business faced ?

Total Incidents: According to Rankiteo, Telkom Business has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Telkom Business ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=telkom-business' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge