Home » cybersecurity » Page 16

cybersecurity

Are University’s Doing Enough to Address the Cybersecurity Skills Gap

Sourced from International IDEA A global shortage of cybersecurity professionals has become so severe that companies are increasingly at risk from hacking and industrial espionage. Protecting data and defending corporate networks is poised to be one of the most in-demand careers of the future. Yet companies are already struggling to fill job vacancies, and the problem is accelerating. “Every company is going digital, and the first thing they have to ask is how secure are their networks and data,” says Doros Hadjizenonos, the Regional Sales Director at Fortinet. The danger is that cybercrime has grown so huge and lucrative that without enough good guys to keep them safe, businesses and individuals alike are in jeopardy. “If a company doesn’t have the right skills it’s increasing its risk to...

5 Things to Do After a Ransomware Attack

In South Africa, 42% of ransomware victims pay the ransom to restore access to their data. Yet for 19% of those, paying the ransom did not guarantee the return of stolen data. However, as public awareness of potential cyber threats grows there is the reason for optimism in the fight against ransomware. Ransomware is a type of malware which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device. According to a report from Kaspersky, whether they paid or not, only 24% of victims were able to restore all their encrypted or blocked files following an attack. 61% lost at least some files, 32% lost a significant amount, and 29% lost a small number of files. Meanwhile, 11% who did experience such an incident lost almost all their data. “Thi...

Protecting the IT Landscape in a Borderless World

The evolution of technology has pushed the perimeter of organisations further and further towards the edge, and we no longer have the monolithic structures we did in the past. The cloud, the Internet of Things (IoT), even the COVID-19 pandemic accelerating the adoption of a work from home model, have contributed to what has, in effect, become a borderless world. This means that the traditional approach to security of locking down the perimeter is simply no longer enough. The perimeter cannot be easily defined, and the way in which we access services has fundamentally changed. Cybersecurity mesh has emerged as a framework to address this challenge, with a distributed security architecture that more effectively meets the challenges of today’s landscape. Trust no one With IT infrastructure so...

Fixing Your Cybersecurity Issues 1 Next-Gen Firewall at a Time

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa When did you last check your firewalls as a barrier to entry against cybercriminals? And, perhaps more importantly: does your organisation still rely on a legacy firewall, or has it upgraded to a next-generation firewall (NGFW)? And have you considered the ‘Broken window’ principle when looking at your internal cybersecurity posture, in order to have a positive effect on your business processes? These questions are posed by Stefan van de Giessen: General Manager: Cybersecurity at Networks Unlimited Africa, who says, “The broken window theory rests on the idea that a neighbourhood or community that appears to be orderly and well-kept will be less susceptible to crime. Conversely, one that has many broken wind...

5 Reasons Why (Not Only) Financial Companies Struggle with Cybersecurity

Financial services companies have been a popular target for cybercriminals for a long time. Not without good reason, since beyond working with money, financial companies handle a slew of sensitive client data that criminals utilise in various fraud schemes or sell-off on dark web bazaars. According to Verizon’s 2020 Data Breach Investigations Report, in the past year alone the financial industry has suffered more than 1,500 incidents, with 448 confirmed data disclosures. Carey van Vlaanderen, CEO of ESET says that in addition to the long-standing threats, most companies have had to contend with the rapid transition to remote work. “The shift happened on extremely short notice, leaving companies with little time to deploy adequate cybersecurity measures or to prepare employees for looming c...

4 Tips to Protect Your Family Online

A recent survey revealed that 51.5% of South African children have been cyberbullied. “The reason for this is the increase in connected societies, more and more people are online, especially the youth,” says Simon Campbell-Young, co-founder and VP of global sales at Digimune. “There is clearly a lack of good cyber education and defensive tools. With this in mind, here are four tips to protect you and your family: 1. Remember that education is key This is the first awareness step. The vast majority of children have access to a wide variety of online devices — either shared or their own device — from a young age. By the age of 10, 30.5% of children have their own smartphone and 41.5% have access to a shared smartphone. It is thus imperative to take time to go about the internet – the good an...

6 Ways to Create a Ransomware Mitigation Strategy

Ransomware attack trends continue to evolve, and the current iterations seen during the COVID-19 pandemic are no exception. During this time, malicious actors have attacked healthcare organisations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can have on organisations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways. And according to a recent FortiGuard Labs global threat landscape report, ransomware remains a prolific threat that increased in 2020 and became even more disruptive. Mature cyber hygiene is key Attackers know that end-users are high-target, high-value assets. Ransomware leverages social engineering attacks, preying on fears as a way to exe...

How to Create a Culture of Cybersecurity

Sourced from IDG Connect Security. This is a word that can make a grown CFO tremble and an entire SOC crumble. It is the word that captures a complex landscape littered with complexity, cybercriminals and technology. It defines how well an organisation adheres to a growing body of legislation – GDPR, POPIA and other data protection regulations – and how its reputation fares when a breach is revealed and information exposed. Security should be on every boardroom agenda, in ongoing employee training, and an investment into the right tools and solutions. But, perhaps most importantly, security should be an inherent part of the company’s culture because it is this factor that ultimately determines its security risk and posture. “There is a clear link between security culture and secure behavio...

5 Cybersecurity Tips for Startups

Sourced from International IDEA From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial activity the world over. Startups tend to be created by people who burn with an idea and want to put it into action as soon as possible. Money is usually tight, and expenses run high, what with product development, promotion, and all the rest of it. When managing priorities, emerging businesspeople often neglect matters related to information security. Many startups try to save on security, confident that a small company with limited resources holds no interest for cybercriminals. The truth is anyone can fall victim to cybercrime. Firstly, becaus...

Why Cyber Attacks are Technology’s ‘Natural’ Disasters

Sourced from Forbes The SolarWinds attack was stunning in its scope and scale. If it were an earthquake, it would be 9.9 on the Richter scale. As digital transformation accelerates in 2021 and beyond—and applications accelerate as central enablers of business and all manner of digital life—cyberattacks have become technology’s natural disasters. Both have the power for profound devastation, threaten our sense of safety, and are (sadly) the reality of our world today. There is, however, one notable difference between a natural disaster and cybercrime. It is within our control to reduce the devastating impact of cybercrime. We can learn from the weaknesses the SolarWinds attack exposed and use this event as a catalyst for behaviour changes that will materially reduce the impact of future att...

How the ‘Broken Window’ Theory Affects Cybersecurity Matters

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa Here at Networks Unlimited Africa, we are applying the ‘broken window’ principle when looking at our internal cybersecurity posture and how it affects business processes. The term ‘Broken window’ comes from George Kelling, a criminologist, who wrote in 1982 that, “social psychologists and police officers tend to agree that if a window in a building is broken and is left unrepaired, all the rest of the windows will soon be broken… vandalism can occur anywhere once communal barriers…are lowered by actions that seem to signal that ‘no one cares’.” This theory had also been the subject of experiments previously (1969) by a professor at Stanford University, Philip Zimbardo.  Zimbardo arranged to have a car w...

Crypto ban: We acted in Nigerians’ best interest – CBN

The Governor, Central Bank of Nigeria (CBN), Mr Godwin Emefiele, says the Bank’s decision to prohibit deposit money banks, non-banking institutions, and other financial institutions from facilitating trading and dealings in cryptocurrency is in the best interest of Nigerian depositors and the country’s financial system. Mr Emefiele made the declaration on Tuesday, February 23, 2021, while briefing a joint Senate Committee on Banking, Insurance and Other Financial Institutions; ICT and Cybercrime; and Capital Market, on its directive to institutions under its regulation. Describing the operations of cryptocurrencies as dangerous and opaque, the CBN Governor said the use of cryptocurrency contravened an existing law. He said given the fact that cryptocurrencies were issued by unregulated and...