Uncategorized

dpa

DATA PROTECTION 101

Data protection can be defined as the mechanism of safeguarding personal data and entails protections granted with respect to collection, processing, dissemination and use of the data. The Data Protection Act (the Act) came into force on the 8th of November 2019 and is currently in the implementation phase. The Act defines what constitutes personal data, as well as outlines the rights and obligations of parties involved in the processing of personal data, including the data subject, data controller...

Read more...

Same Zero Days, New Target: Chrome

If you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it immediately to the latest version Google released June 9th. The internet services company has rolled out an urgent update to the browser to address 14 newly discovered security issues, including a zero-day flaw that it says is being actively exploited in the wild. Tracked as CVE-2021-30551, the vulnerability stems from a type confusion issue in its V8 open-source and JavaScript engine. At the Sentinel Cybershield SOC,...

Read more...

Implementation of Data Protection & Data Privacy Regulations

As more and more social and economic activities have place online, the importance of data privacy and data protection is increasingly recognized. Data Privacy or Information privacy is a part of the data protection area that deals with the proper handling of data focusing on compliance with data protection regulations. Data Privacy is centered around how data should be collected, stored, managed, and shared with any third parties, as well as compliance with the applicable privacy laws  Privacy laws are relevant today than ever before, with questions...

Read more...

The Future of Internal Audit; Empowering the Third Line

As part of our interactions for Internal Audit Awareness month, we ran this webinar on the future of internal audit. The third line of defense provides assurance to senior management and the board that the first and second lines’ efforts are consistent with expectations.  Our panelists included; Rodah Owako - Sentinel Africa Rodney Hood Adriko - Centenary Bank Rosalind Muriithi - IIA Kenya

Read more...

Common Cybersecurity Trends to Look out for in 2021

There is no question organizations are still reeling from the massive work-from-home shift that forced them to rethink cybersecurity and placed new dependencies on technologies such as cloud services and digital collaborative tools such as Zoom, Skype and Slack. Those 2020 trends will have a lasting impact. In fact, some organizations announced that majority of their workforce would continue working from home in the coming year. Endpoint Security Therefore, in 2021, home is where the attacks will happen. This will subsequently...

Read more...

3 Ways To Protect Your Identity Online

Within security awareness training programs, cybersecurity experts promote various tactics and best practices to implement within personal and work environments to protect your identities online and reduce the risk of theft or privacy loss. While these concepts seem like a broken record to some people, here are 3 best practices that can significantly reduce the opportunity for a cyber criminal to steal your data: Stop Oversharing When creating new online accounts with a financial institution, or other accounts that contain a lot of...

Read more...

MALICIOUS ANDROID APPLICATIONS AND THE THREAT OF THIRD-PARTY APP STORES

Malicious Android applications tend to masquerade as applications that perform a useful service while in the background are stealing information. These applications are commonly classified as Remote Access Trojans (RAT). They allow an attacker to gain unauthorized remote access to a user device with the capability of viewing, extracting and altering the user’s data. Recently a RAT known as ‘System Update’ was discovered by researchers at the firm Zimperium. This application pretends to manage system updates for your phone ensuring...

Read more...

Anatomy of the Traditional Antimalware

In the previous article, we had a comparison between the traditional antivirus against the modern antimalware technologies. We learned the evolution of these technologies and the need for an organization to have visibility of their endpoints. It is important to understand that in the past ten years attacks have been evolving from traditional malware and phishing attacks to advanced persistent threats. The cyber threat landscape has been increasing daily and the average cyber-attacks occurring daily have multiplied. Attackers have therefore...

Read more...

BUSINESS CONTINUITY LESSONS FROM 2020

2020 was a tough year for many organizations where we faced a global pandemic and increase in cyber activity among other disruptions. Here are the lessons we look at from the year 2020 when it comes to Business Continuity Planning. Most organizations have structures to mitigate risks, however the probability of some risks materializing is very low. This does not prove that the controls are effective, it is simply good luck. It is important to test effectiveness of controls over time...

Read more...

2020 CYBERSECURITY, THE YEAR THAT WAS

2020 was a year like no other for all of us, and this especially for the cybersecurity space. It was the year whereby working from home became normal, and security controls for teleworking were tested immensely. 2020 also marked an increase in data privacy concerns and general uptake of data privacy regulations, as well as an increase in sophistication of cyberattacks. Some notable events that took place around the world in 2020 are highlighted herein: Twitter: Cyber attackers leveraged on cyber...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry