Cyber Security

Cyber Security

ESSENTIAL TIPS FOR PERSONAL CYBERSECURITY

With the heightened Cybercrime what are the essential tips for personal cybersecurity? Do you recall how our greatest concern was that our computer would become infected with a virus? Now fast forward ten years, and it is the least of our worries. Today, there are trillions of cybercriminals with the ability to bring entire sectors to a halt. Because a lot of vital information is stored online, fraudsters can do a lot of damage. And that is the case. That isn't...

Read more...

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet the growing needs to protect endpoints. In this episode we get to conduct a deep dive on the structure of malware and how the malware has evolved to continue infiltrating organization and cause mass data leaks, denial of services and disruption of business operations. Over the last decade malware was deployed using social engineering techniques and removable devices. This has advanced to...

Read more...

Ransomware Attacks: The Process

Ransomware continues to be a significant threat to organizations of all sizes. Every day in our SOC monitoring activities, we observe different indicators of compromise (IOCs) that point to impending ransomware attacks. In a recent case, we observed the Trojan.Ransom.WannaCryptor.H present in several networks. This trojan was introduced by a malicious program, mssecsvc.exe, often seen in the popular WannaCry ransomware attacks. The file, running from the path c:\windows\mssecsv keeps attempting to execute using system privileges. Execution of this program initiates...

Read more...

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size. 84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics. Organizations implement Information management systems to cater for their information security needs...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...

PHISHING

With the ongoing global pandemic, many business and organizations have been forced to shift to working from home with most of their activities done online. This naturally came with an increase in cybercrime coincidentally as cyber criminals went all out to exploit any if not all vulnerabilities caused by remote working. Globally, $1.6 Billion was lost in companies due to ransom ware and other phishing attacks alone between 2019 and late 2020. 97% of most company employees cannot recognize...

Read more...
IT Infrastructure

Cyber Security and IT Infrastructure Protection

Today technology has become a significant driver for businesses thereby making IT environment strategic in the actualization of organizational wide strategy. However, it is increasingly daunting on how the technologies that initially intended for good reasons are exposing the consuming organization and the users to risks of various nature. To optimize the value every technology brings with it, organizations should consider the alignment of the business requirements that bring up the need for the technology, implementation the recommended best practices...

Read more...

A BRIEF HISTORY AND CURRENT TRENDS OF EDR (Endpoint Detection and Response)

The term EDR stands for Endpoint Detection and Response. It was coined by Anton Chuvakin of Gartner in 2013. It refers to tools primarily focused on detecting and investigating suspicious activities and other problems on hosts/endpoints such as PCs used by end-users. EDR software gathers data from endpoint devices and then analyzes the data to reveal potential cyber threats and issues Organisations used antivirus systems until early 2012 when this technology transitioned to EDR. This transition was informed by attackers developing...

Read more...

Information Security in Startups

Do not wait to be big to be concerned! Cyber security is fast becoming a significant concern for every business/organization. We can no longer ignore the fact that technological advancements have introduced more sophisticated cyber threats. This in turn has resulted into establishment of legal frameworks to aid in curbing cyber space criminal activities. We have not yet seen it all, but no one knows what waits in “future”. It is most unfortunate that startups will always be more concerned of...

Read more...

Mobile Security and Information Security

According to www.statistica.com, the internet, mobile security has been demystified in various meanings which lead to the Information Security description. Mobile Security can be therefore termed as protection of data and computing devices from threats and vulnerabilities, where the devices are smartphones, tablets, laptops, and other wearable devices with the capability of processing data. Due to the emergence of Bring Your Own Device policies in an organization, cloud computing, and other technologies, we have seen organizations allowing their staff...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry