Information Security

FUNDAMENTALS OF INFORMATION SECURITY CONTROLS

In my time as a Cybersecurity consultant, I have come across many instances when after a security assessment or audit, I am looked at with great expectation to recommend an out of this world solution to loopholes that have been unearthed by an audit or assessment. Sadly, though often, my response fails to get a standing ovation. Why? Because of how simple it tends to be. Reports have shown that in Kenya almost 90% of security breaches occur on information systems...

Read more...

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size. 84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics. Organizations implement Information management systems to cater for their information security needs...

Read more...

INFORMATION SECURITY WHY IT MATTERS

Globally, the information security market is expected to grow at a five-year CAGR of 8.5% to reach $170.4 billion in 2022. This growth projection is expected to take this trend mainly due to increased regulations and awareness in organizations on the complex threats, according to Gartner Research. Unfortunately, many organizations have the belief that once they have installed an Endpoint Detection Response system or carried out an audit of their systems at one point, with no foreseeable vulnerabilities they are...

Read more...

Top 5 ways to keep your password secure

Passwords have become necessary in our everyday lives from our mobile phones, computers, bank applications and even everyday convenience applications such as delivery apps. The security of your bank account, social media accounts and email inbox depends on how well you safeguard your many passwords. The key to your online security is to have strong passwords, but the challenge is how do I create distinct password that one can remember or should one just make a bad choice and use...

Read more...

SECURITY OPERATIONS CENTER (SOC) MONITORING SOLUTION

Over the years, before information security theft became complex, many information security- related theft were of physical breach type. For instance, waking up to an office break-in only to realize the bandit stole the entire IT equipment within the organization. Sad, right? Luckily, this created an adaption for stringent physical controls implementation such as automatic door locks with alarm sensors, 360 degrees CCTV surveillance, to 24/7-armed guarding for physical IT asset protection. This gave information security experts the peace...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...

PHISHING

With the ongoing global pandemic, many business and organizations have been forced to shift to working from home with most of their activities done online. This naturally came with an increase in cybercrime coincidentally as cyber criminals went all out to exploit any if not all vulnerabilities caused by remote working. Globally, $1.6 Billion was lost in companies due to ransom ware and other phishing attacks alone between 2019 and late 2020. 97% of most company employees cannot recognize...

Read more...

PRIVACY INFORMATION MANAGEMENT SYSTEMS – PIMS (why your organization needs it)

The industrial revolution has led to a complex and diverse operating environment for business globally. Among key concerns for organizations and individuals alike is the ability to protect data. Having a data privacy system  limits who has access to important data. The importance of having a Private Information Management Systems (PIMS) cannot be overlooked. Locally, there has been a rise in privacy regulations. Which calls for an informed background before complying with the privacy laws. The disruption across industries has...

Read more...

Information Security in Startups

Do not wait to be big to be concerned! Cyber security is fast becoming a significant concern for every business/organization. We can no longer ignore the fact that technological advancements have introduced more sophisticated cyber threats. This in turn has resulted into establishment of legal frameworks to aid in curbing cyber space criminal activities. We have not yet seen it all, but no one knows what waits in “future”. It is most unfortunate that startups will always be more concerned of...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry