Author - Sentinel Africa

Ransomware Attacks: The Process

Ransomware continues to be a significant threat to organizations of all sizes. Every day in our SOC monitoring activities, we observe different indicators of compromise (IOCs) that point to impending ransomware attacks. In a recent case, we observed the Trojan.Ransom.WannaCryptor.H present in several networks. This trojan was introduced by a malicious program, mssecsvc.exe, often seen in the popular WannaCry ransomware attacks. The file, running from the path c:\windows\mssecsv keeps attempting to execute using system privileges. Execution of this program initiates...

Read more...

Anatomy of the Traditional Antimalware

In the previous article, we had a comparison between the traditional antivirus against the modern antimalware technologies. We learned the evolution of these technologies and the need for an organization to have visibility of their endpoints. It is important to understand that in the past ten years attacks have been evolving from traditional malware and phishing attacks to advanced persistent threats. The cyber threat landscape has been increasing daily and the average cyber-attacks occurring daily have multiplied. Attackers have therefore...

Read more...

FUNDAMENTALS OF INFORMATION SECURITY CONTROLS

In my time as a Cybersecurity consultant, I have come across many instances when after a security assessment or audit, I am looked at with great expectation to recommend an out of this world solution to loopholes that have been unearthed by an audit or assessment. Sadly, though often, my response fails to get a standing ovation. Why? Because of how simple it tends to be. Reports have shown that in Kenya almost 90% of security breaches occur on information systems...

Read more...

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size. 84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics. Organizations implement Information management systems to cater for their information security needs...

Read more...

INFORMATION SECURITY WHY IT MATTERS

Globally, the information security market is expected to grow at a five-year CAGR of 8.5% to reach $170.4 billion in 2022. This growth projection is expected to take this trend mainly due to increased regulations and awareness in organizations on the complex threats, according to Gartner Research. Unfortunately, many organizations have the belief that once they have installed an Endpoint Detection Response system or carried out an audit of their systems at one point, with no foreseeable vulnerabilities they are...

Read more...

Top 5 ways to keep your password secure

Passwords have become necessary in our everyday lives from our mobile phones, computers, bank applications and even everyday convenience applications such as delivery apps. The security of your bank account, social media accounts and email inbox depends on how well you safeguard your many passwords. The key to your online security is to have strong passwords, but the challenge is how do I create distinct password that one can remember or should one just make a bad choice and use...

Read more...

SECURITY OPERATIONS CENTER (SOC) MONITORING SOLUTION

Over the years, before information security theft became complex, many information security- related theft were of physical breach type. For instance, waking up to an office break-in only to realize the bandit stole the entire IT equipment within the organization. Sad, right? Luckily, this created an adaption for stringent physical controls implementation such as automatic door locks with alarm sensors, 360 degrees CCTV surveillance, to 24/7-armed guarding for physical IT asset protection. This gave information security experts the peace...

Read more...

BUSINESS CONTINUITY LESSONS FROM 2020

2020 was a tough year for many organizations where we faced a global pandemic and increase in cyber activity among other disruptions. Here are the lessons we look at from the year 2020 when it comes to Business Continuity Planning. Most organizations have structures to mitigate risks, however the probability of some risks materializing is very low. This does not prove that the controls are effective, it is simply good luck. It is important to test effectiveness of controls over time...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...

PHISHING

With the ongoing global pandemic, many business and organizations have been forced to shift to working from home with most of their activities done online. This naturally came with an increase in cybercrime coincidentally as cyber criminals went all out to exploit any if not all vulnerabilities caused by remote working. Globally, $1.6 Billion was lost in companies due to ransom ware and other phishing attacks alone between 2019 and late 2020. 97% of most company employees cannot recognize...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry