Home » cybersecurity » Page 14

cybersecurity

Top 10 Cybersecurity Misperceptions

Between more sophisticated cybercriminals and immense pressure to ensure governance on compliance, 2021 is already shaping up to be a minefield. And as such, cybersecurity has risen to the top of most organisations’ agendas. With this in mind, research from Sophos shows the top 10 cybersecurity misperceptions:  Misperception 1: We are not a target; we are too small and/or have no assets of value to an adversary. Many cyberattack victims assume they are too small, in a sector of no interest or lacking the kind of lucrative assets that would attract an adversary. The truth is, it doesn’t matter: if you have the processing power and a digital presence, you are a target.   Misperception 2: We don’t need advanced security technologies installed everywhere. Some IT teams still believe ...

Can You Hack-Proof the Cloud?

The cost and impact of cybercrime are climbing by around 15% every year, according to a 2020 report in Cybercrime Magazine, and is expected to cost $10,5 trillion globally by 2025. This makes cybercrime, they argue, more profitable than the global illegal drug trade. The real costs are far greater though, both broadly and to individual companies, as these funds represent lost investment and innovation, and companies increasingly face stringent fines for personal data losses under regulations such as the General Data Protection Regulation (EU GDPR) and Protection of Personal Information (PoPI) Act. The human layer All it takes is a chink in the armour, warns John Ward, SME of Cloud Business for Africa at Fortinet, and this can be through human error, misconfiguration, permissions-...

Unpacking Lessons from Ransomeware Attacks in 2021

It’s nearly impossible to read the news without seeing at least one headline blaring about a breach, hack or attack. In the USA, the Colonial Pipeline experienced a Darkside ransomware attack that affected more than 10, 000 gas stations. Virgin Active was hit by a hack in early May 2021 and took weeks to re-establish its systems. Vastaamo, a platform that provided therapy to thousands of patients, lost its data to hackers thanks to an unexpected security flaw. The hackers sent ransom demands to patients – pay up, or your personal information is public knowledge. As Stephen Osler, Co-Founder and Business Development Director at Nclose, points out, the criminal networks and masterminds behind digital attacks are doing their jobs and have every motivation to do these jobs extremely well. “The...

Beware of this New SMS Phishing Scheme Spreading Worldwide

A new, and viral, phishing scheme has seen fraudsters putting mobile users’ financial information at risk, according to Kaspersky. The cybersecurity company revealed that attackers, typically under the guise of a postal service, request a small sum of money for the shipping costs of a package. Once a user clicks on an SMS authentication code for the money transfer, the device is compromised thereby enabling increasingly larger amounts of money to be stolen. “Because it is not a complex phishing attack, it has already gained traction in other parts of the world with fraudsters able to pose as virtually any service provider from prepaid electricity to airtime, naming just a few examples,” says Bethwel Opil, Enterprise Sales Manager at Kaspersky in Africa. Phishing, regardless of the scheme u...

Should West African Businesses Embrace Mobile Authentication for Security?

Sourced from International IDEA Digital technology has not only profoundly altered the way we live our lives, but also changed the pace of communication and commerce, allowing us to do everything, immediately. While this has effectively impacted every aspect of our lives, it also inevitably changed the way we are targeted by fraudsters. Along with the world transforming to digital, so has crime. According to an Accenture report published in 2019, the total value at risk of cybercrime over the next five years is an estimated $5.2 trillion. The average cyberattack costs $13 million, according to the same report, with phishing, social engineering and stolen device crime making up $2.4 million of the cost of an average attack. In West Africa, cybercrime is on the increase, with a recent analys...

Top 10 Suspicious Email Subject Lines to Look Out For in 2021

Despite phishing email attacks related to COVID-19 on the rise, users are becoming more savvy and alert to these types of scams. Real phishing emails that were reported to IT departments related to security-minded users about password checks are steadily rising in popularity. “With COVID-19 being around for over a year now and employees becoming more aware of the types of scams that have come out related to the pandemic, cybercriminals are having less success with related phishing attacks,” says Stu Sjouwerman, CEO of KnowBe4. “While users are becoming savvier regarding COVID-19 phishing attacks, there is a steady increase of those falling for security-related email scams. The bad guys go with what works and in Q1, nearly a third of the users who fell for a phishing email clicked on one re...

Ireland’s health service IT systems shut down by ransomware attack

Ireland’s health service said it was under a ransomware attack on Friday that forced it to shut down its computer systems. A ransomware attack locks users out of their computer systems until they pay a fee to the intruder. There were few details, but the attack was described as significant by Ireland’s Health Service Executive. Motorists line up for fuel at one of the few remaining gas stations that still has fuel in Arlington, Virgina, on May 13, 2021. AFPBiden says oil pipeline back in operation after cyber attack It said it was shutting down all its IT systems to protect them from the attack while it consulted security partners. Covid-19 vaccinations would still go ahead as planned, the agency said. “We apologise for inconvenience caused to patients and to the public and will give furth...

Why People Should Invest in a Culture of Zero Trust Security

Sourced from International IDEA During a preview of this year’s RSA conference, a team from Orange Cyberdefense demonstrated a range of pretty scary scenarios of what can happen when malicious actors take control over a user’s home router. These range from duping users into downloading payloads dressed up as fake VPN software updates, capturing user’s credentials or redirecting traffic that should be going over the VPN to the threat actor. Typically, home routers are outside of the enterprise security control and often not very well protected. The majority of people trust their ISP to set up their home access points for them, frequently resulting in default settings such as admin/admin credentials. Home routers are frequently attacked by criminal and state actors alike. Despite the easing ...

Whitepaper: Protecting Electronic Personal Health Information Through Access Rights Management

Summary The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a number of requirements for your organization in order to secure personal health information (PHI). In this paper, you will be introduced to an access rights management service portfolio, the five titles of the HIPPA, and how SolarWinds Access Rights Manager can help you meet central HIPAA requirements. Data Theft in the Health Sector Based on the 2018 Healthcare Cybersecurity Report1 the healthcare industry ranks fifteenth when compared to 17 major U.S. industries. According to the report’s findings, even “top performers” struggle with network security. The U.S Department of Health and Human Services estimates that over 40 percent of privacy violations in the healthcare sector are caused by hacking or...

8 Ways to Protect Against Ransomware Attacks

Ransomware attack trends continue to evolve, and the current iterations are no exception. During the last year, malicious actors have attacked healthcare organisations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can have on organisations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways. And according to a recent FortiGuard Labs global threat landscape report, ransomware remains a prolific threat that increased in 2020 and is set to more disruptive. With that in mind, here are eight ways to create a strong ransomware mitigation strategy: Continuously providing employees with updates on new social engineering attack methodologies so they know w...

7 Common Ways Cybercriminals Compromise Passwords

One of the most important parts of avoiding compromise is understanding how cybercriminals may attempt to gain access to your critical data, reveals Renee Tarun, VP of Information Security at Fortinet. He goes on to say that attack techniques continue to evolve and become more sophisticated, giving cybercriminals a vast toolkit to use to exploit users. Here are seven techniques to look out for: Social engineering attacks: Attacks such as phishing through emails and texts, where users are tricked into providing their credentials, clicking on malicious links or attachments, or going to malicious websites. Dictionary attacks: Attacker uses a list of common words, called the dictionary to try to gain access to passwords in anticipation that people have used common words or short pass...

Kaspersky Expands Footprint in Nigeria and Ghana

Image sourced from Discover Germany Kaspersky has partnered with DataGroupIT to grow its cybersecurity business within Nigeria and Ghana. “DataGroupIT is a well-known distributor in Africa with a clear value-add when it comes to generating focused business growth, especially in the enterprise segment. It also has the capacity to support the Kaspersky business logistically and provide valuable technical expertise on Kaspersky solutions,” says Lehan van den Heever, Enterprise Cyber Security Advisor for Kaspersky in Africa. DataGroupIT has more than 1 000 clients in over 15 Sub-Saharan African countries with its professional teams delivering exceptional sales, pre-sale, logistic, marketing, and financial support. The partnership between the two organisations is expected to further enhanc...