A report from December 13, 2025, paints a grim picture of the state of cybersecurity in the Kingdom of Eswatini. The nation is grappling with a significant and growing number of cyberattacks, while the government's response is described as largely ineffective. Key issues identified include a lack of investment, outdated legal frameworks, a critical shortage of skilled cybersecurity professionals, and a failure to implement the national cybersecurity strategy for 2022-2027. This inaction has left Eswatini's citizens, businesses, and government institutions dangerously exposed to cybercrime.
The core of the problem lies in a governance and policy vacuum. The country's legal frameworks for combating cybercrime are outdated and lack the necessary enforcement mechanisms to deter threat actors. The Eswatini National Cybersecurity Strategy 2022-2027, which outlines goals for building capacity and strengthening governance, has seen little tangible progress or implementation. There is minimal budget allocated to cybersecurity projects, and law enforcement agencies are reportedly ill-equipped to investigate or prosecute cybercrime cases, leaving victims with little to no recourse.
The lack of a national cybersecurity posture affects all sectors of the country:
The issue is not a failure to meet compliance requirements, but rather the absence of a robust compliance and enforcement regime. The report suggests a fundamental need to establish and enforce cybersecurity standards and regulations across both public and private sectors. Without a governing body to mandate and audit security controls, adoption of best practices remains voluntary and sparse.
The report implicitly calls for a multi-pronged approach to building a national cybersecurity capability:
Implementing national public awareness campaigns is a foundational step to improve baseline security hygiene among citizens and small businesses.
Establishing a framework for auditing government agencies and critical sectors against a national cybersecurity standard is necessary for governance.
Developing and promoting secure configuration baselines for government systems is a key technical measure.
Mapped D3FEND Techniques:
As a foundational step for Eswatini, the government should develop and mandate a national Strong Password Policy for all its agencies and promote it as a best practice for the private sector. This policy should include requirements for password complexity, length, and history, and explicitly forbid the use of common or easily guessable passwords. While simple, this is a high-impact, low-cost measure that hardens systems against brute-force and password spraying attacks, which are common tactics used in less mature cyber environments. A public awareness campaign accompanying the policy can educate citizens on the importance of using unique passwords for different services, directly addressing the vulnerability of individuals to online scams.
To provide a basic level of protection at a national scale, Eswatini's government could establish a national DNS denylist service. This involves creating and maintaining a list of known malicious domains associated with phishing, malware, and command-and-control servers. The government could then offer a free, public DNS resolver service that incorporates this denylist, which citizens and businesses can opt to use. This would prevent users from connecting to a large number of malicious sites, effectively providing a national-level protective DNS service. This is a scalable way to protect a large number of users with minimal endpoint configuration and is a common feature of a national cybersecurity strategy.
The government of Eswatini must prioritize the creation and enforcement of a national patch management policy for all government systems. This policy should mandate that all software, from operating systems to applications, be updated to patch security vulnerabilities within a defined timeframe. A lack of patching is a primary reason for successful cyberattacks globally. By creating a centralized directive and providing guidance, the government can significantly raise the security posture of its own institutions. This policy should be a core component of the currently unenforced National Cybersecurity Strategy and would serve as a model for the private sector to follow, reducing the overall attack surface of the entire country.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats