Home » African Cybersecurity Landscape

African Cybersecurity Landscape

Top 10 Cybersecurity Misperceptions

Between more sophisticated cybercriminals and immense pressure to ensure governance on compliance, 2021 is already shaping up to be a minefield. And as such, cybersecurity has risen to the top of most organisations’ agendas. With this in mind, research from Sophos shows the top 10 cybersecurity misperceptions:  Misperception 1: We are not a target; we are too small and/or have no assets of value to an adversary. Many cyberattack victims assume they are too small, in a sector of no interest or lacking the kind of lucrative assets that would attract an adversary. The truth is, it doesn’t matter: if you have the processing power and a digital presence, you are a target.   Misperception 2: We don’t need advanced security technologies installed everywhere. Some IT teams still believe ...

Should West African Businesses Embrace Mobile Authentication for Security?

Sourced from International IDEA Digital technology has not only profoundly altered the way we live our lives, but also changed the pace of communication and commerce, allowing us to do everything, immediately. While this has effectively impacted every aspect of our lives, it also inevitably changed the way we are targeted by fraudsters. Along with the world transforming to digital, so has crime. According to an Accenture report published in 2019, the total value at risk of cybercrime over the next five years is an estimated $5.2 trillion. The average cyberattack costs $13 million, according to the same report, with phishing, social engineering and stolen device crime making up $2.4 million of the cost of an average attack. In West Africa, cybercrime is on the increase, with a recent analys...

Why People Should Invest in a Culture of Zero Trust Security

Sourced from International IDEA During a preview of this year’s RSA conference, a team from Orange Cyberdefense demonstrated a range of pretty scary scenarios of what can happen when malicious actors take control over a user’s home router. These range from duping users into downloading payloads dressed up as fake VPN software updates, capturing user’s credentials or redirecting traffic that should be going over the VPN to the threat actor. Typically, home routers are outside of the enterprise security control and often not very well protected. The majority of people trust their ISP to set up their home access points for them, frequently resulting in default settings such as admin/admin credentials. Home routers are frequently attacked by criminal and state actors alike. Despite the easing ...

Kaspersky Expands Footprint in Nigeria and Ghana

Image sourced from Discover Germany Kaspersky has partnered with DataGroupIT to grow its cybersecurity business within Nigeria and Ghana. “DataGroupIT is a well-known distributor in Africa with a clear value-add when it comes to generating focused business growth, especially in the enterprise segment. It also has the capacity to support the Kaspersky business logistically and provide valuable technical expertise on Kaspersky solutions,” says Lehan van den Heever, Enterprise Cyber Security Advisor for Kaspersky in Africa. DataGroupIT has more than 1 000 clients in over 15 Sub-Saharan African countries with its professional teams delivering exceptional sales, pre-sale, logistic, marketing, and financial support. The partnership between the two organisations is expected to further enhanc...

Here’s How Many Mobile Users in Kenya and Nigeria are Affected by Stalkerware

Stalkerware affects one out of every 100 mobile users in Kenya and Nigeria, according to Kaspersky Research. The same report reveals that similar malware impacts every four out of 100 South Africans. “Even though these numbers might seem low, especially when it comes to stalkerware, it bears mentioning that this form of attack is focused on specific individuals,” says Lehan van den Heever, Enterprise Cyber Security Advisor for Kaspersky in Africa. “So, unlike general malware that is distributed on a massive scale, stalkerware is a more personal crime that has life and death consequences for the individual affected, for example, a perpetrator can track down their estranged partner with ill intentions, or human trafficking rings targeting children.” Amongst other things, stalkerware can enab...

6 Ways to Protect Your Business from Ransomware

With an ever-growing number of people working from home, primarily due to the global COVID-19 pandemic, cybersecurity attacks are on the rise, meaning that dealing with security risks is an ongoing journey for enterprises. IDC predicts that by 2023, 60% of data will be generated at the edge by people working from home and from devices outside of the corporate firewall. While at the same time, many corporate cloud services are already being rendered from locations outside the data centre. This has given rise to ransomware attacks as many employees who are working remotely have their firewalls and access points configured to allow remote access. With that in mind, here are 6 things Kaspersky experts recommend to protect your company from ransomware: Always keep software updated on all t...

Why Cybersecurity Patches are only Part of a Plan

Patches are undoubtedly an essential component of a cybersecurity strategy. They can be used to address vulnerabilities, resolve issues or improve solutions. However, a patchwork approach alone is simply no longer sufficient. The current digital landscape, with many employees continuing to work from home, means most organisations’ attack surfaces are so much wider and less contained than before. Businesses need a plan that includes patch management and vulnerability management as part of an overarching strategy aimed at mitigating and managing cybersecurity risk. A place for patches Patches are useful tools, ensuring that updates can be pushed out, vulnerabilities addressed and recommended configuration changes made across an organisation. Patches are typically a retrospective development ...

Research Shows an Increase in Ransomware Attacks on South African Companies

South Africa is firmly in the sights of international cybercrime syndicates, who have been ramping up their attacks on local companies in the past six months – reveals cybersecurity defence, offence and protection specialist, Nclose. ‎ Martin Potgieter, Co-Founder of ‎Nclose, says the Nview MDR team have detected a significant uptick in the number of attempts made against local customers in recent months. “We, and our colleagues in the cybersecurity sector, are seeing a surge in cybercrime activity – in particular ransomware attacks,” he says. “There has definitely been an increase in syndicates that make use of humans to launch and coordinate their attacks, they are not just relying on automated ransomware attacks.” Stephen Osler, Co-Founder at Nclose, says South African companies typical...

Are University’s Doing Enough to Address the Cybersecurity Skills Gap

Sourced from International IDEA A global shortage of cybersecurity professionals has become so severe that companies are increasingly at risk from hacking and industrial espionage. Protecting data and defending corporate networks is poised to be one of the most in-demand careers of the future. Yet companies are already struggling to fill job vacancies, and the problem is accelerating. “Every company is going digital, and the first thing they have to ask is how secure are their networks and data,” says Doros Hadjizenonos, the Regional Sales Director at Fortinet. The danger is that cybercrime has grown so huge and lucrative that without enough good guys to keep them safe, businesses and individuals alike are in jeopardy. “If a company doesn’t have the right skills it’s increasing its risk to...

Protecting the IT Landscape in a Borderless World

The evolution of technology has pushed the perimeter of organisations further and further towards the edge, and we no longer have the monolithic structures we did in the past. The cloud, the Internet of Things (IoT), even the COVID-19 pandemic accelerating the adoption of a work from home model, have contributed to what has, in effect, become a borderless world. This means that the traditional approach to security of locking down the perimeter is simply no longer enough. The perimeter cannot be easily defined, and the way in which we access services has fundamentally changed. Cybersecurity mesh has emerged as a framework to address this challenge, with a distributed security architecture that more effectively meets the challenges of today’s landscape. Trust no one With IT infrastructure so...

Fixing Your Cybersecurity Issues 1 Next-Gen Firewall at a Time

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa When did you last check your firewalls as a barrier to entry against cybercriminals? And, perhaps more importantly: does your organisation still rely on a legacy firewall, or has it upgraded to a next-generation firewall (NGFW)? And have you considered the ‘Broken window’ principle when looking at your internal cybersecurity posture, in order to have a positive effect on your business processes? These questions are posed by Stefan van de Giessen: General Manager: Cybersecurity at Networks Unlimited Africa, who says, “The broken window theory rests on the idea that a neighbourhood or community that appears to be orderly and well-kept will be less susceptible to crime. Conversely, one that has many broken wind...

6 Ways to Create a Ransomware Mitigation Strategy

Ransomware attack trends continue to evolve, and the current iterations seen during the COVID-19 pandemic are no exception. During this time, malicious actors have attacked healthcare organisations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can have on organisations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways. And according to a recent FortiGuard Labs global threat landscape report, ransomware remains a prolific threat that increased in 2020 and became even more disruptive. Mature cyber hygiene is key Attackers know that end-users are high-target, high-value assets. Ransomware leverages social engineering attacks, preying on fears as a way to exe...

  • 1
  • 2