Blog
This is just one of the many cases in Nigeria today. Many organization’s IT infrastructure has been owned by attackers and they are heavily contributing to the money this threat actors can make in cryptocurrency value every year.
Read MoreWhat happens when your organization has received a notification of a potential security breach, and now you need to respond quickly, effectively and with efficiency? It should be noted, that without a comprehensive incident response plan, the roles, responsibilities, procedures and communications for your IT security team will not be prepared to make critical business…
Read MoreSo you have finally arrived at the conclusion that you have the variables in place at your organization, and that it’s time to establish your very own SOC. You are well aware of the complexities of building a SOC, and that there are so many variables to consider. First the outer shell concept, then the…
Read MoreIn these challenging times with low levels of skilled cyber experts and with hackers getting faster and smarter – how are we going to outsmart cyber crime? We believe that there are four main advantages to making the move to an MSSP. Committing to a monthly service instead of purchasing hardware, software, and implementation services…
Read MoreThere are many challenges in cybersecurity today, not least of which is lack of specialized manpower to fulfil key roles within the cybersecurity discipline. Some new developments within this field, include automation and orchestration, that is shifting the way that cybersecurity teams are operating on a day-to-day basis. Whereas before there were so many broken-down…
Read MoreWSetting up a well-functioning security SOC brings many processes together. Building the delicate balance across people, processes, and technology has to be weaved together, and precision is a key and foundational element. The risks involved with anything related to IT security are rising progressively and business across the global divide are seeking the best way…
Read MoreResearch is constantly shows statistics with high percentages of breaches – up to 38% due to employees. Sometimes malicious, but most of the times not. But employee negligence is one of the highest threats to any organization. Cybersecurity safety in the workplace is rising in importance if only due to the impact it can have…
Read MoreIn today’s business and commercial climate Cyber Security activity is at its peak, particularly with regards to online transactions, massive customer databases and mobile banking. The sheer scale of this type of activity makes it nearly impossible not to fall prey to the routine cyber-attacks that have become all too common in 2018. This…
Read MoreIt is rarely malicious employees who are the sole source of insider threats. It is often well intentioned ones that inadvertently help perpetrators by providing them with a way to get into your system. Attackers use phishing techniques, such as spam e-mails in order to find out information about employees, receive their credentials or infect your…
Read MoreThinking like a criminal, quite literally putting yourself empathetically into the cyber hacker’s shoes, could be the very best way to protect your organization from cyber crime. Let’s reverse engineer this. A scenario of not patching in a timely manner should include a cost-benefit analysis of a series of worst case scenarios. These would include…
Read More