Monthly Archives - February 2021

PHISHING

With the ongoing global pandemic, many business and organizations have been forced to shift to working from home with most of their activities done online. This naturally came with an increase in cybercrime coincidentally as cyber criminals went all out to exploit any if not all vulnerabilities caused by remote working. Globally, $1.6 Billion was lost in companies due to ransom ware and other phishing attacks alone between 2019 and late 2020. 97% of most company employees cannot recognize...

Read more...

2020 CYBERSECURITY, THE YEAR THAT WAS

2020 was a year like no other for all of us, and this especially for the cybersecurity space. It was the year whereby working from home became normal, and security controls for teleworking were tested immensely. 2020 also marked an increase in data privacy concerns and general uptake of data privacy regulations, as well as an increase in sophistication of cyberattacks. Some notable events that took place around the world in 2020 are highlighted herein: Twitter: Cyber attackers leveraged on cyber...

Read more...

PRIVACY INFORMATION MANAGEMENT SYSTEMS – PIMS (why your organization needs it)

The industrial revolution has led to a complex and diverse operating environment for business globally. Among key concerns for organizations and individuals alike is the ability to protect data. Having a data privacy system  limits who has access to important data. The importance of having a Private Information Management Systems (PIMS) cannot be overlooked. Locally, there has been a rise in privacy regulations. Which calls for an informed background before complying with the privacy laws. The disruption across industries has...

Read more...
IT Infrastructure

Cyber Security and IT Infrastructure Protection

Today technology has become a significant driver for businesses thereby making IT environment strategic in the actualization of organizational wide strategy. However, it is increasingly daunting on how the technologies that initially intended for good reasons are exposing the consuming organization and the users to risks of various nature. To optimize the value every technology brings with it, organizations should consider the alignment of the business requirements that bring up the need for the technology, implementation the recommended best practices...

Read more...

A BRIEF HISTORY AND CURRENT TRENDS OF EDR (Endpoint Detection and Response)

The term EDR stands for Endpoint Detection and Response. It was coined by Anton Chuvakin of Gartner in 2013. It refers to tools primarily focused on detecting and investigating suspicious activities and other problems on hosts/endpoints such as PCs used by end-users. EDR software gathers data from endpoint devices and then analyzes the data to reveal potential cyber threats and issues Organisations used antivirus systems until early 2012 when this technology transitioned to EDR. This transition was informed by attackers developing...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry