Company Details
telkom-business
10,001
6,926
517
telkombusiness.co.za
0
TEL_2180102
In-progress

Telkom Business Company CyberSecurity Posture
telkombusiness.co.zaTelkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the Telkom Group, Telkom Business operates from a head office located in Centurion, Gauteng, employing over 800 sales, marketing, product and support teams around the country. Positioned as the industry leader in telecommunications and ICT in South Africa, Telkom Business offers capability solutions across the technology spectrum. At Telkom Business, the world of Convergence is where IT and telecommunications meet in a seamless, synergistic relationship that can benefit any size of business. Show more Show less
Company Details
telkom-business
10,001
6,926
517
telkombusiness.co.za
0
TEL_2180102
In-progress
Between 750 and 799

Telkom Business Global Score (TPRM)XXXX



No incidents recorded for Telkom Business in 2025.
No incidents recorded for Telkom Business in 2025.
No incidents recorded for Telkom Business in 2025.
Telkom Business cyber incidents detection timeline including parent company and subsidiaries

Telkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the Telkom Group, Telkom Business operates from a head office located in Centurion, Gauteng, employing over 800 sales, marketing, product and support teams around the country. Positioned as the industry leader in telecommunications and ICT in South Africa, Telkom Business offers capability solutions across the technology spectrum. At Telkom Business, the world of Convergence is where IT and telecommunications meet in a seamless, synergistic relationship that can benefit any size of business. Show more Show less


Prazer, somos a Claro! Aqui, temos um grande time que faz tudo acontecer! É com o esforço e a dedicação de cada uma de nossas Pessoas que somos hoje referência no que fazemos, atuando unidos no nosso propósito, que é “Conectar para uma vida mais divertida e produtiva”. Somamos todas as tecnologias

We are Telecom Argentina, a connectivity solutions and entertainment company with over 23,000 collaborators throughout the country. We transform the digital experience of our over 28 million customers providing them a secure, flexible and dynamic service on all of their devices, with high speed mobi
We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity an

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout

Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a
🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

We’re the people that make the net work. As the nation’s largest wholesale broadband network, we’re rolling out Ultrafast Full Fibre broadband across the UK. It’s our fastest and most reliable broadband yet, and we’re well on our way to making it available to 25m homes and businesses – building the
.png)
BCX CEO Jonas Bogoshi is clear-eyed about the challenges and the opportunities facing the South African IT services provider.
Telkom is intensifying its cybersecurity strategy to protect South African businesses and consumers as digital threats escalate.
In recognition of Cyber Security Awareness Month, Digicel Business and Symptai are offering a complimentary dark web scan to Caribbean...
KAMPALA - In a move that underscores its ongoing expansion across Africa, the Paratus Group — a leading pan-African telecommunications and...
Telkom Indonesia agreed on Tuesday to partially spin off its wholesale fibre connectivity business to its subsidiary Telkom Infrastruktur...
Telkom SA SOC Limited, South Africa's leading information and communications technology (ICT) company, invites applications for its 2025...
Safaricom has called on enterprises to urgently strengthen their cybersecurity platforms, warning that vulnerabilities are leaving many...
Sanctions lock up MTN's Middle East exit, while fresh M&A whispers reignite the battle for South Africa's telecom throne.
Cybercriminal activity in South Africa increased by 14% between July 2024 and July 2025, with attack frequencies increasing to 2113...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Telkom Business is http://www.telkombusiness.co.za.
According to Rankiteo, Telkom Business’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, Telkom Business currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Telkom Business is not certified under SOC 2 Type 1.
According to Rankiteo, Telkom Business does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Telkom Business is not listed as GDPR compliant.
According to Rankiteo, Telkom Business does not currently maintain PCI DSS compliance.
According to Rankiteo, Telkom Business is not compliant with HIPAA regulations.
According to Rankiteo,Telkom Business is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Telkom Business operates primarily in the Telecommunications industry.
Telkom Business employs approximately 10,001 people worldwide.
Telkom Business presently has no subsidiaries across any sectors.
Telkom Business’s official LinkedIn profile has approximately 6,926 followers.
No, Telkom Business does not have a profile on Crunchbase.
Yes, Telkom Business maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telkom-business.
As of December 14, 2025, Rankiteo reports that Telkom Business has not experienced any cybersecurity incidents.
Telkom Business has an estimated 9,723 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Telkom Business has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.