Blog

The Proliferation of Crypto-mining Malware in Nigeria.

By TallyE / March 19, 2020 /

This is just one of the many cases in Nigeria today. Many organization’s IT infrastructure has been owned by attackers and they are heavily contributing to the money this threat actors can make in cryptocurrency value every year.

Read More

Incident Response & Investigation through Managed Services

By TallyE / October 27, 2019 /

What happens when your organization has received a notification of a potential security breach, and now you need to respond quickly, effectively and with efficiency? It should be noted, that without a comprehensive incident response plan, the roles, responsibilities, procedures and communications for your IT security team will not be prepared to make critical business…

Read More

How to Build an Effective Security Operations Center (SOC)

By TallyE / May 22, 2019 /

So you have finally arrived at the conclusion that you have the variables in place at your organization, and that it’s time to establish your very own SOC. You are well aware of the complexities of building a SOC, and that there are so many variables to consider. First the outer shell concept, then the…

Read More

Is it time to move your cyber operations to an MSSP?

By TallyE / May 12, 2019 /

In these challenging times with low levels of skilled cyber experts and with hackers getting faster and smarter – how are we going to outsmart cyber crime? We believe that there are four main advantages to making the move to an MSSP. Committing to a monthly service instead of purchasing hardware, software, and implementation services…

Read More

Automation and Orchestration; The paradigm shift transforming Cybersecurity Managed Services

By TallyE / April 10, 2019 /

There are many challenges in cybersecurity today, not least of which is lack of specialized manpower to fulfil key roles within the cybersecurity discipline. Some new developments within this field, include automation and orchestration, that is shifting the way that cybersecurity teams are operating on a day-to-day basis. Whereas before there were so many broken-down…

Read More

When is it Right to Setup a Security Operations Center?

By TallyE / February 26, 2019 /

WSetting up a well-functioning security SOC brings many processes together. Building the delicate balance across people, processes, and technology has to be weaved together, and precision is a key and foundational element. The risks involved with anything related to IT security are rising progressively and business across the global divide are seeking the best way…

Read More

Employees are your Workplace Ambassadors for Cyber Security

By TallyE / February 24, 2019 /

Research is constantly shows statistics with high percentages of breaches – up to 38% due to employees. Sometimes malicious, but most of the times not. But employee negligence is one of the highest threats to any organization. Cybersecurity safety in the workplace is rising in importance if only due to the impact it can have…

Read More

CyberDome: Protecting Your Business

By TallyE / February 24, 2019 /

In today’s business and commercial climate Cyber Security activity is at its peak, particularly with regards to online transactions, massive customer databases and mobile banking. The sheer scale of this type of activity makes it nearly impossible not to fall prey to the routine cyber-attacks that have become all too common in 2018.   This…

Read More

What is the best Defense for E Mail Attacks? #phishing

By TallyE / February 24, 2019 /

It is rarely malicious employees who are the sole source of insider threats. It is often well intentioned ones that inadvertently help perpetrators by providing them with a way to get into your system. Attackers use phishing techniques, such as spam e-mails in order to find out information about employees, receive their credentials or infect your…

Read More

How Thinking like a Criminal serves your organization?

By TallyE / February 24, 2019 /

Thinking like a criminal, quite literally putting yourself empathetically into the cyber hacker’s shoes, could be the very best way to protect your organization from cyber crime. Let’s reverse engineer this. A scenario of not patching in a timely manner should include a cost-benefit analysis of a series of worst case scenarios. These would include…

Read More