Monthly Archives - March 2021

FUNDAMENTALS OF INFORMATION SECURITY CONTROLS

In my time as a Cybersecurity consultant, I have come across many instances when after a security assessment or audit, I am looked at with great expectation to recommend an out of this world solution to loopholes that have been unearthed by an audit or assessment. Sadly, though often, my response fails to get a standing ovation. Why? Because of how simple it tends to be. Reports have shown that in Kenya almost 90% of security breaches occur on information systems...

Read more...

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size. 84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics. Organizations implement Information management systems to cater for their information security needs...

Read more...

INFORMATION SECURITY WHY IT MATTERS

Globally, the information security market is expected to grow at a five-year CAGR of 8.5% to reach $170.4 billion in 2022. This growth projection is expected to take this trend mainly due to increased regulations and awareness in organizations on the complex threats, according to Gartner Research. Unfortunately, many organizations have the belief that once they have installed an Endpoint Detection Response system or carried out an audit of their systems at one point, with no foreseeable vulnerabilities they are...

Read more...

Top 5 ways to keep your password secure

Passwords have become necessary in our everyday lives from our mobile phones, computers, bank applications and even everyday convenience applications such as delivery apps. The security of your bank account, social media accounts and email inbox depends on how well you safeguard your many passwords. The key to your online security is to have strong passwords, but the challenge is how do I create distinct password that one can remember or should one just make a bad choice and use...

Read more...

SECURITY OPERATIONS CENTER (SOC) MONITORING SOLUTION

Over the years, before information security theft became complex, many information security- related theft were of physical breach type. For instance, waking up to an office break-in only to realize the bandit stole the entire IT equipment within the organization. Sad, right? Luckily, this created an adaption for stringent physical controls implementation such as automatic door locks with alarm sensors, 360 degrees CCTV surveillance, to 24/7-armed guarding for physical IT asset protection. This gave information security experts the peace...

Read more...

BUSINESS CONTINUITY LESSONS FROM 2020

2020 was a tough year for many organizations where we faced a global pandemic and increase in cyber activity among other disruptions. Here are the lessons we look at from the year 2020 when it comes to Business Continuity Planning. Most organizations have structures to mitigate risks, however the probability of some risks materializing is very low. This does not prove that the controls are effective, it is simply good luck. It is important to test effectiveness of controls over time...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry