Stopping the next cyber attack

August 2015 Cyber Security, IT infrastructure

Doros Hadjizenonos, country manager of Check Point South Africa, explains how organisations can mitigate threats and how SA compares to the rest of Africa when it comes to cyber crime.

Doros Hadjizenonos.
Doros Hadjizenonos.

Given the ever-increasing sophistication of cybercrime methods, organisations must employ advanced assessment tools and practices to reduce or eliminate security gaps. The first step to a successful security posture is to know what your current security network looks like. It’s hard to strengthen a security foundation when you don’t know where the weaknesses are.

Cyber threats have gained a lot of media attention recently, and the perception that Africa is not likely to experience cyber attacks is false. Africa has one of the highest number of cyber attacks, which have mostly targeted government websites in Nigeria, Ghana and Senegal over the recent months.

Basie van Solms, director of the Centre for Cyber Security at the University of Johannesburg, says that South Africa is lagging behind Africa when it comes to adopting a stable cyber security policy and that there is a lack overall of a cyber security strategy and culture. The South African government has been criticised for not having a decisive policy and control over the growing problem of cyber crime, which cost the country over R3.4 billion in one year alone.

South African organisations, therefore, have an even greater reason to ensure their networks and data are protected – and it starts with understanding where they’re at. Organisations need to do a comprehensive assessment, which will evaluate the current state of the security network in all areas, from network architecture and security infrastructure and policy, to monitoring capability and incident response readiness. It will identify potential vulnerabilities and highlight gaps in security resources, capabilities and infrastructure. By conducting this evaluation, organisations will generate the information required to design a blueprint for fundamentally secure operations.

Teams should begin by examining the network architecture by looking at ingress and egress points. Specifically, they’ll want to check how many there are, where they are and how they’re used, as well as how they are protected, managed and controlled. Having a complete understanding of ingress and egress points is vital to maintaining the health of the security network.

Next, understand what critical services are required to run day-to-day business operations. Are they protected? What controls are in place to protect their operation? What is the most sensitive data for the organisation? Is this data being protected, and how? What controls are in place to protect access and fidelity? They’ll also need to decide what data should be encrypted while at rest and while in motion, a critical factor in the event of data theft.

Evaluate the segmentation of the network. Is the network segmented? If so, is the network segmented properly to prevent easy access across large portions of the network?

It’s also important to check all of the security controls that are in place. Some key design considerations for all security controls include where they’re deployed, whether they’re in detect or prevent mode, and if they’re set to block known attacks. Teams should also check if the controls are integrated to support the entire security infrastructure and whether they support user identity.

Having this assessment gives teams the knowledge they need to create a stronger security system. Once you have a full assessment of the network, you’ve completed the first step to stopping the next massive cyber attack.

For more information contact Check Point South Africa, +27 (0)11 319 7267, doros@checkpoint.com, www.checkpoint.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your business a cyber target?
Issue 2 2020 , Cyber Security
MJ Strydom, MD of cybersecurity specialist DRS reveals why every business is a breach target in 2020.

Read more...
Passwordless authentication
Issue 2 2020 , Cyber Security
Thales’s support for Fast IDentity Online (FIDO) 2.0 provides passwordless access to Microsoft Azure Active Directory-connected apps and other services.

Read more...
Sophos expands MSP programme
Issue 2 2020 , Cyber Security
Sophos MSP Connect Programme premiers new security offerings and PSA/RMM integrations amidst increasing partner demand.

Read more...
Educating employees about mobile cyber threats
Issue 2 2020 , Cyber Security
While nearly 9 in 10 companies allow employees to access critical business apps using their personal devices, Android-based malware now represents 14% of all cyber threats.

Read more...
Africa, you’ve been phished
Issue 2 2020 , Cyber Security
The 2019 KnowBe4 African Report across South Africa, Kenya, Nigeria, Ghana, Egypt, Morocco, Mauritius and Botswana has found that Africa is not prepared for cyber risks.

Read more...
Suprema BioMini Slim 3
Issue 2 2020, Suprema , Cyber Security
Replace passwords by integrating fingerprint biometrics into your solution with BioMini Slim 3 and its easy-to-use SDK.

Read more...
Understanding evolving cybersecurity needs
Issue 2 2020, Vox Telecom , Cyber Security
In the digitally-connected world with numerous data entry points into the organisation, cybersecurity requires a multi-layered approach.

Read more...
Coronavirus-themed security attacks on the increase
Issue 2 2020 , Cyber Security
Cybercriminals aren't guided by the same moral compass as the rest of humanity. In fact, they are using the current COVID-19 pandemic to try and break through defences.

Read more...
Tips on secure remote working
Issue 2 2020 , Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.

Read more...
What will happen to digital privacy in the upcoming decade?
Issue 2 2020, Kaspersky , Cyber Security
Your data is now everywhere. Your phone. Your smartwatches. Your smart home. And if something goes just a little bit wrong – it will disappear in just one click.

Read more...