Information Security

Cyber Security

ESSENTIAL TIPS FOR PERSONAL CYBERSECURITY

With the heightened Cybercrime what are the essential tips for personal cybersecurity? Do you recall how our greatest concern was that our computer would become infected with a virus? Now fast forward ten years, and it is the least of our worries. Today, there are trillions of cybercriminals with the ability to bring entire sectors to a halt. Because a lot of vital information is stored online, fraudsters can do a lot of damage. And that is the case. That isn't...

Read more...

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet the growing needs to protect endpoints. In this episode we get to conduct a deep dive on the structure of malware and how the malware has evolved to continue infiltrating organization and cause mass data leaks, denial of services and disruption of business operations. Over the last decade malware was deployed using social engineering techniques and removable devices. This has advanced to...

Read more...

Implementation of IT General Controls against ISO 27001 Standard Framework

Complexity of the IT setup has greatly increased. This has resulted to a greater focus around controls in the IT environment. Information Technology General Controls (ITGC) are controls that govern how technology is designed, implemented, and used in an organization. They are the foundation of the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. These basic controls can be applied to IT systems such as operating systems, databases,...

Read more...

FUNDAMENTALS OF INFORMATION SECURITY CONTROLS

In my time as a Cybersecurity consultant, I have come across many instances when after a security assessment or audit, I am looked at with great expectation to recommend an out of this world solution to loopholes that have been unearthed by an audit or assessment. Sadly, though often, my response fails to get a standing ovation. Why? Because of how simple it tends to be. Reports have shown that in Kenya almost 90% of security breaches occur on information systems...

Read more...

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size. 84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics. Organizations implement Information management systems to cater for their information security needs...

Read more...

INFORMATION SECURITY WHY IT MATTERS

Globally, the information security market is expected to grow at a five-year CAGR of 8.5% to reach $170.4 billion in 2022. This growth projection is expected to take this trend mainly due to increased regulations and awareness in organizations on the complex threats, according to Gartner Research. Unfortunately, many organizations have the belief that once they have installed an Endpoint Detection Response system or carried out an audit of their systems at one point, with no foreseeable vulnerabilities they are...

Read more...

Top 5 ways to keep your password secure

Passwords have become necessary in our everyday lives from our mobile phones, computers, bank applications and even everyday convenience applications such as delivery apps. The security of your bank account, social media accounts and email inbox depends on how well you safeguard your many passwords. The key to your online security is to have strong passwords, but the challenge is how do I create distinct password that one can remember or should one just make a bad choice and use...

Read more...

SECURITY OPERATIONS CENTER (SOC) MONITORING SOLUTION

Over the years, before information security theft became complex, many information security- related theft were of physical breach type. For instance, waking up to an office break-in only to realize the bandit stole the entire IT equipment within the organization. Sad, right? Luckily, this created an adaption for stringent physical controls implementation such as automatic door locks with alarm sensors, 360 degrees CCTV surveillance, to 24/7-armed guarding for physical IT asset protection. This gave information security experts the peace...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...

PHISHING

With the ongoing global pandemic, many business and organizations have been forced to shift to working from home with most of their activities done online. This naturally came with an increase in cybercrime coincidentally as cyber criminals went all out to exploit any if not all vulnerabilities caused by remote working. Globally, $1.6 Billion was lost in companies due to ransom ware and other phishing attacks alone between 2019 and late 2020. 97% of most company employees cannot recognize...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry