Home » cybersecurity » Page 13

cybersecurity

IoT is One of Medicine’s Biggest Tools – Also Its Weakest Security Link

Image sourced from HP Consultant. /* custom css */ .tdi_4_0e2.td-a-rec-img{ text-align: left; }.tdi_4_0e2.td-a-rec-img img{ margin: 0 auto 0 0; } Healthcare has always been on the cutting edge, with hospitals and healthcare providers typically quick to embrace any innovation that will translate into better, more efficient, more affordable care. From microscopic pill cameras and implantable devices to laser surgery and advanced monitoring techniques, medical technology is all about creating the best possible patient outcome. But when it comes to the latest wave of innovative products, powered by always-on, always-connected internet of things (IoT) technology, there are growing concerns that security issues may eventually harm medical institutions or the patients themselves. /* custom css */...

Is Cybersecurity as Necessary as Electricity?

Sourced from Travellers Cybersecurity has become as much a business necessity as having electricity says South African financial services and insurance company, Sanlam. Threat actors are constantly evolving and relentlessly hunting for vulnerabilities, cybercrime has become so profitable that exploitation is their business priority, and regulation is increasingly complex to navigate and manage. For Sanlam, cybersecurity has always been more than plugging holes and filling gaps, it’s a priority that has to be embedded within business foundations while managing cost, growth, customer experience, data analytics and regulatory controls. “Developing a comprehensive and holistic cybersecurity solution is a mandate for us, one that we must meet to ensure customer, stakeholder and industry trust. ...

Joe Biden pointedly asks Vladimir Putin about cyberattacks at summit

U.S. President Joe Biden asked Russian President Vladimir Putin on Wednesday how he would feel if someone carried out a ransomware attack on Russian oil pipelines, a pointed question during their summit that illustrated the breadth of their disagreements. The query referred to a cyberattack that closed the Colonial Pipeline Co system for several days in May, preventing millions of barrels of gasoline, diesel and jet fuel from flowing to the U.S. East Coast from the Gulf Coast. Both leaders described their first summit in a lakeside Swiss villa as professional, rather than friendly, and said they agreed to hold lower-level talks on cybersecurity and arms control and to send their ambassadors back to their capitals. But there was no hiding their differences on issues such as human rights, wh...

3 Freshest & Latest Trends for Cloud Security in 2021

Sourced from InfoWorld. With cloud security continuing to be a hot topic in 2021, Fortinet and Cybersecurity Insiders decided to ask cybersecurity professionals around the world and across all industries for their latest insight. The brand new 2021 Cloud Security Report reveals how more than 500 cybersecurity professionals —from technical executives to managers and IT security practitioners — are responding to security threats in the cloud, how their organisations are using the cloud, and the best practices they are prioritising. Let’s take a look at some of the key findings. 1. A Diverse Digital Landscape – The Role of Cloud Security First, and perhaps not surprisingly, organisations continue to rapidly adopt the cloud to meet key business objectives. And that trend doesn’t...

4 Simple Steps Your Company Can Take to Protect ERP Systems from Cyber-Threats

Image sourced from Software ONE. Cybercrime taps into the vulnerability of business systems and can pose a real threat to a robust supply chain. A sophisticated ransomware attack recently targeted the world’s largest meat processor. Following the business system breach, operations in the US and Australia were disrupted, resulting in a knock-on effect. The meat processor had no option but to shut down nine beef plants in the United States and several plants in Australia. Several truck drivers who specialize in hauling livestock also had no choice but to drive hundreds of miles to pick up cattle from an alternative supplier. For the end-consumer, the long-term impact of the cyber-attack could mean inflated meat prices. Unfortunately, this is not the only instance of a cyber-attack on critica...

Cybersecurity Is More than A Tech Problem – It’s a Business Problem Too

Image sourced from Finance Times. A concerning number of South African companies are not prepared for the inevitability of a cyberattack despite the significant financial and reputational risks, according to Ryan Mer, MD, eftsure Africa, a Know Your Payee (KYP) platform provider. “Too few senior managers view cybersecurity as a business problem and not just a technology problem,” he says. “The reality is cybersecurity is very much a business consideration. CEOs and CFOs will eventually face critical questions such as: How much money do we spend on cybersecurity? Do we change key processes? How do we create awareness and change company culture? Do we put security ahead of operational functionality? What is the role of internal processes and staff on data security and integrity?.” Mer adds t...

6 Urgent Steps Companies Need to Take to Ensure POPIA Compliance

Sourced from Europa EU. The eleventh hour is upon businesses who are not POPIA (Protection of Personal Information Act) compliant. The effective date of 1 July is upon us. Your business should have already started its compliance journey, as it will at least help lessen the risk of cybersecurity breaches. Securing your data will help your business be in good standing with local and international partners. This will also enhance the reputation of your business and exempt you from fines and non-compliance. Here are six steps your business can take before 01 July to be POPIA compliant: 1. Encrypt Everything One of the major requirements under POPIA is to ensure that you apply Generally Accepted Information Security Protocols. While these requirements are not the same for all organisations, som...

Kaspersky Discovers Various Malicious Apps Disguising as Bestselling Game Minecraft

Sourced from Stuff. Recognised as the world’s top-selling game of all time, Minecraft attracts the attention of enthusiastic players around the world but also draws the interest of fraudsters. Earlier, Kaspersky researchers discovered more than 20 applications advertised on app stores offering additional Minecraft features. Though these malicious apps were deleted from official stores, Kaspersky experts have found newly developed ones, which exploit the game to further fraudster’s objectives. Malware on Google Play Store Kaspersky researchers analysed various apps, including those which are available for download on the Google Play store and claimed to be modpacks (user-created packages with additional gameplay elements) for the game. As a result, the company’s experts found various malici...

Confidential Computing – Why Privacy Should be the Heart of Digital Experiences

Image sourced from Intel. In this past year, the consumer experience came to the forefront. As we faced various stages of lockdowns, we turned to online banking, seeing our doctors remotely, running our businesses using technology and socialising through a screen. Digital interactions became a part of our lives – ever-present and normalised as we navigated changes swept in by this pandemic. As our digital interaction became seamless and permeated through every aspect of our lives, privacy continued to be top of mind. We carried out our lives predominantly online – making many of us more vulnerable to fraudsters. As we navigated living our lives digitally, data theft dominated 2020 as the most common attack in the Middle East and Africa. Across the region, data theft and leaks accounted for...

Cybersecurity and Data Protection Laws Urgently Needed Across Africa

The pandemic has driven home the high value of personal data to the global economy, while also highlighting its vulnerability to abuse and attack. In response, governments around the world have been reviewing their data privacy and protection laws and regulations, including in South Africa and Ghana. Global cybersecurity firm Kaspersky recently noted that cyberattacks are set to rise in African countries, especially in the key financial centres of South Africa, Kenya and Nigeria. The cybersecurity firm noted that rapidly evolving digital techniques had led to an increased risk of Advanced Persistent Threats and hacking-for-hire events in Africa. South Africa In South Africa, the Cybercrimes and Cybersecurity Act was signed into law by South African President Cyril Ramaphosa in early June 2...

Beware of Scammers – 4 Tips to Spot Digital Banking Fraud

Sourced from Pure Cloud Solutions To prevent becoming the victim of fraudsters, it’s vital to be on guard, especially when using transactional, card-based accounts linked to cheque and savings accounts. Vijay Naidoo, CIO at Old Mutual Finance, pointed out that “…transactional accounts are among the most commonly used accounts, which means they are prime targets for scammers.” “Scammers are continually finding new ways to gain access to personal banking information and use it to defraud unsuspecting customers. So, banks need to continually upgrade their security systems, while consumers need to be informed and alert.” Phishing involves sending what appears to be an official email notification from an institution. If you open the message, malware is installed on your computer and account inf...

Why Immutable Architecture is Key to Protecting Backup Data

Ransomware and other malware are a constant threat, and data backup is critical to safeguard a business’ most important asset. However, cybercriminals are increasingly targeting and encrypting backup data copies as well, a strategy that leaves organisations unable to recover unless they pay the ransom. Keeping an immutable copy of backup data is a best practice for data protection and is the solution in the event of a successful two-pronged ransomware attack. What is an immutable architecture? For data to be immutable means that it is unable to be changed over a period of time. With an immutable architecture, when retention policies are set for data backup and recovery, data will be secured, locked and unchangeable for that retention period. This in turn means that it cannot be encrypted b...