Thursday, November 21African Digital Business Magazine

Tag: cybersecurity software

Tech

How do we Build Powerful Defense with Data Storage

By Ning Yun, Director of Data Storage Department of Huawei SAR (Huawei.com)  Ransomware is striking at an alarming rate. Information technology research and consultancy company Gartner predicts, by 2025, at least 75% of IT organizations will face one or more attacks. Refined hacking tools and extortion strategies have made ransomware the biggest threat to individual, enterprise, and national data security. Constant ransomware attacks cause huge damage When ransomware strikes, it steals and encrypts valuable data. Encrypted data can be decrypted only by paying the hackers a ransom. Hackers, working through darknets, usually demand Bitcoin to make the payment as difficult as possible to trace. The damage ransomware creates is great, as are hackers' profits. According to...
Are your Excel spreadsheets a cybersecurity risk?
Tech

Are your Excel spreadsheets a cybersecurity risk?

The use of spreadsheets in accounting and finance departments has vastly improved data analysis and enabled fast and accurate reporting, computing and information storage. Life without them is almost unthinkable. However, danger lurks within and although the use of macros in Excel to automate processes can enhance efficiency, macro malware can put your entire business at risk says Ryan Mer, Managing Director of eftsure Africa, a Know Your Payee™ (KYP) platform provider. Macro malware was fairly common several years ago because macros ran automatically whenever a document was opened. Microsoft has disabled macros by default in recent versions of Microsoft Office. However, Business Email Comprise (BEC) attacks are on the rise, adding an additional layer of risk of spreadsheets being manipul...
Tech

ESET’s Intelligent Solutions Updated for Greater Online Protection

Heading into the festive season, it is more important than ever to ensure that computer and smartphone users are protected from increases in brute force attacks, instances of banking malware, and cryptocurrency threats. ESET, the global cybersecurity leader, has launched a new version of its consumer security line-up, which does just that along with its brand new ESET HOME feature. This web or Android-based platform is placed at the centre of the suite of ESET consumer solutions – allowing users to manage the security of all their Windows and Android devices from one seamless and convenient interface. Smartphones are central to people’s lives, with multiple internet-connected devices in their homes. Simple and efficient protection and management of these devices is critical amidst a ...
South Africa News, Tech

You’re safe from ransomware – if you have R6.4bn lying around

Ransomware attacks have massively increased since the start of lockdown. Here’s what you need to know to protect your company. When hackers targeted Transnet’s computer systems in late July this year, logistics at major ports ground to a near-halt for the second time in a month (following the protests and looting) as the company was forced to switch to manual cargo processing. “The IT industry has seen a massive increase in ransomware attacks since the start of lockdown, when companies’ digital footprints increased as remote work became the norm,” says Marilyn Moodley, Country Leader for South Africa and WECA (West, East, Central Africa) at SoftwareONE. Problematically, many organisations unfortunately only realise too late that ransomware protection is a business issue and not an IT is...
South Africa News, Tech

Cybersecurity is more than a tech issue – it’s a business problem too

A concerning number of South African companies are not prepared for the inevitability of a cyberattack despite the significant financial and reputational risks, according to Ryan Mer, Managing Director, eftsure Africa, a Know Your Payee™ (KYP) platform provider. “Too few senior managers view cybersecurity as a business problem and not just a technology problem. The reality is cybersecurity is very much a business consideration. CEOs and CFOs will eventually face critical questions such as: How much money do we spend on cybersecurity? Do we change key processes? How do we create awareness and change company culture? Do we put security ahead of operational functionality? What is the role of internal processes and staff on data security and integrity?”, he says. Mer adds that because cyber...
Tech

Cisco Study Reveals Top Cybersecurity Considerations for SMEs in 2021

Three Factors Highlighted as Crucial to Achieving Desired Security Outcomes: Enabling Business, Managing Risk and Operating Efficiently Cisco has published its 2021 SMB Security Outcomes Study, a derivative of Cisco’s flagship cybersecurity report, 2021 Security Outcomes Study, highlighting what SMB leaders are doing to thrive in today's ever-evolving threat landscape, as well as offering actionable insights on where they should focus their digitization, security planning and cyber defense efforts in the year ahead. The double-blind study is based on a survey of over 850 regional IT and security professionals from small (50 to 249 employees) and midsize (250 to 499 employees) organizations in 25 countries from the Europe, Middle East, Africa and Russia (EMEAR).  The report examines how sec...
Tech

Sophos Publishes 3-Part Series on the Realities of Conti Ransomware

Research Details the Day-by-Day Unfolding of a Human-Operated Conti Attack Using Fileless Ransomware, Background on the Ransomware’s Behaviors, and Defender Advice   In a new three-part series of articles, Sophos researchers and incident responders unveil what really happens when attackers break into an organization’s network with the intention of stealing data and launching a Conti ransomware attack. Conti is a human-operated “double extortion” ransomware. The attackers steal data from their targets before encrypting it, and then threaten to expose the stolen information on the “Conti News” site if the organization doesn’t pay the ransom. Sophos’ 24/7 incident response team, Sophos Rapid Response, was called in to contain, neutralize and investigate the incident, which unfolded over five ...
AURA builds world’s first WhatsApp security chatbot in partnership with Tracker
South Africa News, Tech

AURA builds world’s first WhatsApp security chatbot in partnership with Tracker

AURA, South Africa’s leading security and medical response platform has launched the world’s first WhatsApp security chatbot in partnership with Tracker, one of the country's most trusted names in stolen vehicle recovery. Powered by AURA, Tracker’s unique Tracker CareGuard service offers rapid mobile emergency response anywhere, anytime within South Africa. The new cutting-edge solution enables subscribers to request immediate mobile armed response assistance wherever they are by sharing a location pin in WhatsApp. Warren Myers, Founder and CEO of AURA says the new WhatsApp service illustrates the power of technology in preventing and combating crime and the role it plays in enabling South African businesses to offer innovative security products and services to customers. “The Tracker Car...
Cisco Reveals Top Cybersecurity Threats of 2020
Tech

Cisco Reveals Top Cybersecurity Threats of 2020

Defending Against Critical Threats Report identifies migration to remote working and evolution of ransomware as key contributors towards diverse criminal activity Cisco has revealed the findings of its Defending Against Critical Threats Report, noting changes in criminal activity during 2020 and new methods of exploitation, arising as a result of the pandemic. During a year in which transitioning to digital infrastructures became essential for all, Cisco explores the ongoing complexity and evolution of cyber threats, to inform organizations and empower stronger decision-making. Increased Vulnerabilities with Remote Working Cisco Umbrella – a cloud-driven Secure Internet Gateway – examined traffic running through its DNS servers, identifying mid-March 2020 as a peak period of increased remo...