Home » cybersecurity » Page 21

cybersecurity

3 Things Healthcare IT Teams can do to Improve Cybersecurity

Sourced from Getty Images. The healthcare industry has been forever changed by digital transformation. Innovation in the medical space has led to advances in new treatments as well as cost savings that do not negatively impact the quality of care. The added benefit: faster, better networks have allowed for the growth of telemedicine, bringing quality care to thousands who did not have access before. An unfortunate side effect has been that cybercriminals are targeting the healthcare sector now more than ever. As a result, cybersecurity is critical to the success of health systems, which are increasingly at risk as cybercriminals look to steal patient data or hold internal resources for ransom. The vulnerabilities that enable these attacks exist in any vertical, but in the case of healthcar...

Hybrid Cloud Environments Provide Cheap Security for Financial Service Organisations

Sourced from ZDNet. Worldwide, financial services organisations are turning to the cloud as the means to transform outdated legacy systems and commit to disruptive technologies. The size of the public cloud market is expected to top $354 billion by the end of 2022, a significant jump from the less than $197 billion of 2018. But instead of going the all-or-nothing route, the hybrid cloud is positioned to provide companies with a more secure way of leveraging their data. Yunus Scheepers, CTO at SilverBridge, discusses these security benefits at a time when Microsoft Azure data centres in the country are attracting attention from financial services organisations as a safer alternative to what their current on-premise offerings can provide. A hybrid cloud environment also provides risk-averse ...

Inadequate Investment in Cybersecurity is Behind Increase in Cyber Attacks

Following on this week’s Life Healthcare cyberattack, the issue of cybersecurity has once again been brought to the fore as businesses and individuals are forced to evaluate whether measures in place are strong enough to withstand major breaches in their security. Life Healthcare is the third major South African company that has been targeted by hackers this year. In February, Nedbank warned that the information of about 1.7 million clients was potentially affected by a data breach, and the following month chemicals and fertiliser maker Omnia Holdings said it’s IT infrastructure was subject to a cyberattack. Amongst the other big businesses that have been targeted in South Africa are Johannesburg City Council, Capitec Bank and Telkom. The trend is also true for the rest of the continent. I...

New “Wormable” Bug Discovered in Windows 10

Sourced from Travellers Windows 10 users have been urged once again to ensure that their systems are updated and properly protected with the latest security patches following the discovery of a dangerous new vulnerability. This comes via Tech Radar. This new warning emanates from US Homeland Security, whose cybersecurity advisory unit has discovered an exploit code for a wormable bug online. The Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) is now urging all Windows 10 users to patch and update their systems immediately to ensure they stay safe from the vulnerability. The bug itself was discovered in a GitHub post. An exploit that targets a known security flaw in the server message block tool that allows Windows to communicate with other devices, including appli...

How Using Cloud Can Increase Security for Remote Working During the Pandemic

Sourced from Tapscape The cloud can enable organisations to quickly scale out enhanced security to a suddenly remote workforce, as part of efforts to ensure business continuity and disaster recovery – this is according to Patrick Grillo, Senior Director and Solutions Marketing at Fortinet. The pandemic had created unique challenges for employers and employees across all sectors around the world, with Varun Kukreja, Senior Program Manager – IT Security MEA, IDC Middle East, Africa, & Turkey, saying securing the teleworker had become a top priority, with some 90% of organisations looking to provide staff with secure access to IT services and applications. The pandemic had also accelerated digital transformation, he says, with an IDC Meta survey interim results revealing that some 56% of ...

CIOs Should Embrace the Opportunities of a Post-lockdown Market

As South Africa enters the tenth week of the nationwide lockdown, the business focus has shifted from enabling employees to work remotely to now planning for what the new normal is likely to look like. This requires CIOs to balance existing organisational priorities with ways of becoming more adaptive to the changing environment. Critical to this is decisive decision-making that positions the business for growth. For small to medium-sized businesses that do not have all the skills in-house to transform their IT environments, decision-makers should consider going the outsourcing route. By partnering with a managed service provider (MSP) that can deliver everything from a cloud-readiness audit through to helping identify the technology gaps that exist between the business strategy and what i...

Use of Cloud Collaboration Tools Surge Across the World and So Do Attacks

The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been a rapid adoption and integration of cloud services, particularly cloud-based tools such as Microsoft Office 365, Slack and other video conferencing platforms like Zoom. A new report by security firm McAfee shows that hackers are responding to this mass migration to these platforms with an increased focus on abusing cloud account credentials. After analyzing cloud usage data that was collected between January and April, from over 30-million enterprise users of its MVISION cloud security monitoring platform, the company estimates a 50% growth in adoption of cloud services across all industries. Some industries, however, saw a much...

Cybersecurity Reimagined for the CIO

Sourced from International IDEA Despite the technological innovation taking place, companies would do well to remain focused on ensuring their IT fundamentals are in place before rushing to capitalise on the latest trends. And nowhere is this more critical than when it comes to cybersecurity. Expectations are that the impact of global cybercrime will cost businesses more than $6 trillion by the end of next year, up from $3 trillion in 2015. It, therefore, remains one of the most significant challenges as digital transformation continues to grow in momentum, and the cloud has become part of standard business operations. Fortunately, companies are taking the protection of their data and networks seriously. Worldwide spending on information security solutions is anticipated to grow at a five-...

Hackers Release New Jailbreak that Unlocks Every iPhone

Sourced from Macworld. A renowned iPhone hacking team has released a new ‘Jailbreak’ tool that unlocks every iPhone, even the most recent models running the latest iOS 13.5. For as long as Apple has kept up its walled garden approach to iPhones by only allowing apps and customization that it approves, hackers have tried to break free from what they call the “jail” – hence the term “Jailbreak.” This allows customising their phones as they see fit. Load whatever apps they want, even change things like issues with iPhone batteries. Hackers do this by finding a previously undisclosed vulnerability in iOS that break through some of the many restrictions that Apple puts in place to prevent access to the underlying software. Apple says it does this for security. But jailbreakers say breaking thro...

5 Ways to Protect Your Business from Mobile Adware

One of the most common forms of cyberthreats designed to collect personal information from a user’s device is mobile adware. This is because roughly 4 billion people are connected to the Internet via their smartphone. Despite the adoption of mobile devices, companies rarely prioritize mobile security. Check Point’s Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached. “It only takes one compromised mobile device for cybercriminals to steal confidential information and access an organization’s corporate network,” explains Pankaj Bhula, Regional Director for Africa at Check Point. The main problem with adware is pinpointing how a phone became infected. Adware is developed to sneak onto a device undetected...

Cybercrime has Increased by 33%, Report Shows

The 100 Days of Coronavirus report – published by Mimecast – shows that the volume of malicious and opportunistic cybercrime has increased significantly by 33% in the period January to March 2020. The new report has found that in the period January to March 2020 monthly volumes of: Spam and opportunistic cybercrime detections increased by 26.3%, Impersonation fraud detections increased by 30.3%, Malware detections increased by 35.16%, and Blocking of URL clicks increased by 55.8%, meaning people are more likely now to click on unsafe links than before the outbreak. Over the months of February and March, as South Africa reported its first case and moved swiftly into lockdown, the Threat Intelligence Team saw dramatic increases in cyberattacks in Sub-Saharan Africa. Carl Wearn, Head of E-Cri...

Remote Connections Up 44% During Lockdown in Nigeria

Sourced from AFP. Many organisations across Africa are finding themselves transitioning their workforce to remote work at home as a result of the COVID-19 pandemic. IT departments are re-architecting their environments on the fly to allow for remote access. Now, according to a report by Serianu, Pan-African based Cybersecurity and Business consulting firm, “in Nigeria, remote connections have increased by around 44% since the onset of COVID-19 with the highest increase realized in March 2020 after the president declared lockdown in key cities. Lagos is, by a vast amount, the most affected state, hosting over 40% of the identified vulnerable connections put at over 4,500 vulnerable connections.” The Guardian Nigeria goes on to note that the report marks increased usage of these services cau...