Monthly Archives - April 2021

Fundamentals of Privacy Information Management Systems In Healthcare

Privacy laws are more relevant today than ever before. With data crossing borders following the increased internet penetration and increased use of social media and other digital information platforms, it is becoming more important to ensure that personal data is protected, processed, and used for the correct purpose. While these protection laws are (sometimes) good news for those who have data stored or transferred online, it may not be so for those who must navigate this mass of regulation. Questions...

Read more...

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet the growing needs to protect endpoints. In this episode we get to conduct a deep dive on the structure of malware and how the malware has evolved to continue infiltrating organization and cause mass data leaks, denial of services and disruption of business operations. Over the last decade malware was deployed using social engineering techniques and removable devices. This has advanced to...

Read more...

3 Ways To Protect Your Identity Online

Within security awareness training programs, cybersecurity experts promote various tactics and best practices to implement within personal and work environments to protect your identities online and reduce the risk of theft or privacy loss. While these concepts seem like a broken record to some people, here are 3 best practices that can significantly reduce the opportunity for a cyber criminal to steal your data: Stop Oversharing When creating new online accounts with a financial institution, or other accounts that contain a lot of...

Read more...

Implementation of IT General Controls against ISO 27001 Standard Framework

Complexity of the IT setup has greatly increased. This has resulted to a greater focus around controls in the IT environment. Information Technology General Controls (ITGC) are controls that govern how technology is designed, implemented, and used in an organization. They are the foundation of the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. These basic controls can be applied to IT systems such as operating systems, databases,...

Read more...

MALICIOUS ANDROID APPLICATIONS AND THE THREAT OF THIRD-PARTY APP STORES

Malicious Android applications tend to masquerade as applications that perform a useful service while in the background are stealing information. These applications are commonly classified as Remote Access Trojans (RAT). They allow an attacker to gain unauthorized remote access to a user device with the capability of viewing, extracting and altering the user’s data. Recently a RAT known as ‘System Update’ was discovered by researchers at the firm Zimperium. This application pretends to manage system updates for your phone ensuring...

Read more...

ENDPOINT SECURITY PROTECTION USING BITDEFENDER

From various sources on the internet, endpoint security has been demystified in various meanings which lead to its popularity in Information Security. Endpoint Security can be therefore termed as protection of data and computing devices from threats and vulnerabilities, where the devices could be smartphones, tablets, laptops, IoT and other wireless devices with the capability of processing data. For businesses to cope, there has been increased adoption of new technologies and greater innovation by device manufacturers, which has enabled...

Read more...

Ransomware Attacks: The Process

Ransomware continues to be a significant threat to organizations of all sizes. Every day in our SOC monitoring activities, we observe different indicators of compromise (IOCs) that point to impending ransomware attacks. In a recent case, we observed the Trojan.Ransom.WannaCryptor.H present in several networks. This trojan was introduced by a malicious program, mssecsvc.exe, often seen in the popular WannaCry ransomware attacks. The file, running from the path c:\windows\mssecsv keeps attempting to execute using system privileges. Execution of this program initiates...

Read more...

Anatomy of the Traditional Antimalware

In the previous article, we had a comparison between the traditional antivirus against the modern antimalware technologies. We learned the evolution of these technologies and the need for an organization to have visibility of their endpoints. It is important to understand that in the past ten years attacks have been evolving from traditional malware and phishing attacks to advanced persistent threats. The cyber threat landscape has been increasing daily and the average cyber-attacks occurring daily have multiplied. Attackers have therefore...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry