Insights

VAPT

VULNERABILITY ASSESSMENT & PENETRATION TESTING AS A CYBER DEFENSE TECHNOLOGY

Cyber-attacks and threats are a real-world problem today with thousands of networks and websites and being compromised every day. Most of the time you cannot defend against an unknown enemy because these attacks leverage on anything. Attacks mostly exploit a flaw in the system, the flaw is either a result of human error or flaw in the source code during software development. Typically, the anatomy of a cyber-attack is an attacker leveraging a flaw to gain access. A flaw...

Read more...

Same Zero Days, New Target: Chrome

If you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it immediately to the latest version Google released June 9th. The internet services company has rolled out an urgent update to the browser to address 14 newly discovered security issues, including a zero-day flaw that it says is being actively exploited in the wild. Tracked as CVE-2021-30551, the vulnerability stems from a type confusion issue in its V8 open-source and JavaScript engine. At the Sentinel Cybershield SOC,...

Read more...

Implementation of Data Protection & Data Privacy Regulations

As more and more social and economic activities have place online, the importance of data privacy and data protection is increasingly recognized. Data Privacy or Information privacy is a part of the data protection area that deals with the proper handling of data focusing on compliance with data protection regulations. Data Privacy is centered around how data should be collected, stored, managed, and shared with any third parties, as well as compliance with the applicable privacy laws  Privacy laws are relevant today than ever before, with questions...

Read more...

The Future of Internal Audit; Empowering the Third Line

As part of our interactions for Internal Audit Awareness month, we ran this webinar on the future of internal audit. The third line of defense provides assurance to senior management and the board that the first and second lines’ efforts are consistent with expectations.  Our panelists included; Rodah Owako - Sentinel Africa Rodney Hood Adriko - Centenary Bank Rosalind Muriithi - IIA Kenya

Read more...

Common Cybersecurity Trends to Look out for in 2021

There is no question organizations are still reeling from the massive work-from-home shift that forced them to rethink cybersecurity and placed new dependencies on technologies such as cloud services and digital collaborative tools such as Zoom, Skype and Slack. Those 2020 trends will have a lasting impact. In fact, some organizations announced that majority of their workforce would continue working from home in the coming year. Endpoint Security Therefore, in 2021, home is where the attacks will happen. This will subsequently...

Read more...

IMPACT OF COVID-19 ON THE FUTURE OF BUSINESS CONTINUITY

“Everybody has a plan until they get punched in the mouth” 2020 was a practical example for this quote. COVID-19 has a paralyzed multiple organizational operation. However, unlike natural and human made disasters, the pandemic is unique and complex due to the uncertainty on time and enterprise-wide impacts building over time, having the ‘Boiling Frog’ effect on organizations. With governments Implementing social and strategic control measures to combat the virus, there has been a huge disruption on a daily business...

Read more...

Fundamentals of Privacy Information Management Systems In Healthcare

Privacy laws are more relevant today than ever before. With data crossing borders following the increased internet penetration and increased use of social media and other digital information platforms, it is becoming more important to ensure that personal data is protected, processed, and used for the correct purpose. While these protection laws are (sometimes) good news for those who have data stored or transferred online, it may not be so for those who must navigate this mass of regulation. Questions...

Read more...

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet the growing needs to protect endpoints. In this episode we get to conduct a deep dive on the structure of malware and how the malware has evolved to continue infiltrating organization and cause mass data leaks, denial of services and disruption of business operations. Over the last decade malware was deployed using social engineering techniques and removable devices. This has advanced to...

Read more...

3 Ways To Protect Your Identity Online

Within security awareness training programs, cybersecurity experts promote various tactics and best practices to implement within personal and work environments to protect your identities online and reduce the risk of theft or privacy loss. While these concepts seem like a broken record to some people, here are 3 best practices that can significantly reduce the opportunity for a cyber criminal to steal your data: Stop Oversharing When creating new online accounts with a financial institution, or other accounts that contain a lot of...

Read more...

Implementation of IT General Controls against ISO 27001 Standard Framework

Complexity of the IT setup has greatly increased. This has resulted to a greater focus around controls in the IT environment. Information Technology General Controls (ITGC) are controls that govern how technology is designed, implemented, and used in an organization. They are the foundation of the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. These basic controls can be applied to IT systems such as operating systems, databases,...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry