Uncategorized

Anatomy of the Traditional Antimalware

In the previous article, we had a comparison between the traditional antivirus against the modern antimalware technologies. We learned the evolution of these technologies and the need for an organization to have visibility of their endpoints. It is important to understand that in the past ten years attacks have been evolving from traditional malware and phishing attacks to advanced persistent threats. The cyber threat landscape has been increasing daily and the average cyber-attacks occurring daily have multiplied. Attackers have therefore...

Read more...

BUSINESS CONTINUITY LESSONS FROM 2020

2020 was a tough year for many organizations where we faced a global pandemic and increase in cyber activity among other disruptions. Here are the lessons we look at from the year 2020 when it comes to Business Continuity Planning. Most organizations have structures to mitigate risks, however the probability of some risks materializing is very low. This does not prove that the controls are effective, it is simply good luck. It is important to test effectiveness of controls over time...

Read more...

2020 CYBERSECURITY, THE YEAR THAT WAS

2020 was a year like no other for all of us, and this especially for the cybersecurity space. It was the year whereby working from home became normal, and security controls for teleworking were tested immensely. 2020 also marked an increase in data privacy concerns and general uptake of data privacy regulations, as well as an increase in sophistication of cyberattacks. Some notable events that took place around the world in 2020 are highlighted herein: Twitter: Cyber attackers leveraged on cyber...

Read more...

Mobile Security and Information Security

According to www.statistica.com, the internet, mobile security has been demystified in various meanings which lead to the Information Security description. Mobile Security can be therefore termed as protection of data and computing devices from threats and vulnerabilities, where the devices are smartphones, tablets, laptops, and other wearable devices with the capability of processing data. Due to the emergence of Bring Your Own Device policies in an organization, cloud computing, and other technologies, we have seen organizations allowing their staff...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry