Put a SOC in it

April 2018 Security Services & Risk Management, Cyber Security

The past two years have seen a veritable explosion of new cybersecurity vulnerabilities, including a steep increase in hacktivism, which Wikipedia describes as ‘the subversive use of computers and computer networks to promote a political agenda or a social change. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights or freedom of information movements.’

Hacktivism came to a head in 2016 around the US elections, with numerous reported malicious cyber assaults being carried out against candidates (including Donald Trump, Hillary Clinton and Bernie Sanders), political parties and governmental IT networks.

Continuing into 2017, we saw WikiLeaks publish thousands of documents claiming the exposure of hacking secrets of the Central Intelligence Agency (CIA), which included the agency’s (and presumably other hackers’) abilities to break into mobile phones, smart TVs, and Microsoft, Mac and Linux operating systems.

A Wired.com article from August 2017 stated that: ‘Yesterday’s WikiLeaks dump reiterated something we already knew: our devices are fundamentally unsafe. No matter what kind of encryption we use, no matter which secure messaging apps we take care to run, no matter how careful we are to sign up for two-factor authentication, the CIA can infiltrate our operating systems, take control of our cameras and microphones, and bend our phones to their will. The same can be said of smart TVs, which could be made to surreptitiously record our living-room conversations, and Internet-connected cars, which could potentially be commandeered and even crashed.’

This year, a mere few weeks ago, a number of global technology companies began to roll out patches addressing design flaws in processors that were named ‘Meltdown’ and ‘Spectre’. The chip vulnerabilities leave devices such as desktops, laptops and smartphones exposed to unauthorised access and information theft, as well as cloud and virtual environments.

Wayne Olsen.
Wayne Olsen.

“Looking at the course of events over the past two years alone, it is clear that organisations across the globe are grappling with a very real, ever growing data security issue – whether it be held on premise or within the cloud,” states Wayne Olsen, security business unit manager at Datacentrix. “Businesses are under immense pressure to protect increasing volumes of data, prevent a myriad of attacks, and do it all faster and more effectively than ever before.”

In order to support local companies looking to boost cybersecurity measures, Datacentrix is launching two new services within its Security Operations Centre (SOC).

“Firstly, we have created the Datacentrix Cyber Threat Intelligence offering, which will allow local firms to monitor malware, phishing and hacking attacks, identify when information has been stolen, as well as check for malicious mobile attacks. We’ve increasingly found that applications are being launched using an organisation’s name, without its knowledge or permission.

“A recent example of this was a fake version of the WhatsApp app that was downloaded a million times from the Google Play Store before it was discovered to be fraudulent. The Cyber Threat Intelligence offering will help to protect against all of these vulnerabilities, as well as other brand abuse, such as bogus social media accounts created using companies’ names.”

The new service allows Datacentrix to find existing and potential attackers – even on the dark web – minute by minute in real time, and ‘take them’,” Olsen explains.

“Secondly, Datacentrix is also introducing a Contextualised Vulnerability Management service, which will identify potential weak spots within a business’ network topology, and put them at the top of the risk and vulnerability list,” he says. “This allows organisations to then remediate any problem areas.

“As a trusted security solution provider, it is Datacentrix’ intention to monitor and defend customer ICT environments in real time against any potential security threats, but to do this in such a way that our clients are also able to reduce costs and leverage existing technology for improved insight. We believe that the new services added to our SOC offering will be a game-changer in the local market,” he concludes.

For more information, go to www.datacentrix.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping our changing environment secure
August 2019 , Editor's Choice, Security Services & Risk Management
For a crime to take place there needs to be a victim and a criminal who sees an opportunity. For a cybercrime to take place we need the same set of circumstances.

Read more...
The importance of real security risk assessments
August 2019, Sentinel Risk Management , Editor's Choice, Security Services & Risk Management, Residential Estate (Industry)
Andy Lawler, MD, Sentinel Risk Management, says a security risk assessment is an onerous task, but is not something estates can consider optional or a luxury item anymore.

Read more...
Risk assessment or product placement?
August 2019, Technews Publishing, Alwinco, SMC - Security Management Consultants , Editor's Choice, Security Services & Risk Management, Residential Estate (Industry)
Hi-tech security solutions asked a couple of experts to provide estate managers and security managers with some insights into what a ‘real’ risk assessment includes.

Read more...
Residential security – caveat emptor
August 2019, Stafix , Integrated Solutions, Security Services & Risk Management
When it comes to improving your property’s security, make sure you take all the options into account as you build a layered approach to keeping people safe and assets secured.

Read more...
Ensuring your electric fence is compliant
August 2019, Stafix , Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
A challenge facing both existing and potentially new perimeter electric fence installations is how to economically meet the legal requirements required in the SANS 10222-3:2016 standards document.

Read more...
Renewable energy for estates and homes
August 2019, Drensky Technologies, Technews Publishing, Specialised Battery Systems , Security Services & Risk Management
While individual homeowners might choose to install solar photovoltaic (PV) systems for when there’s load shedding or a power failure, for an entire estate to harness its energy requirements from solar, and particularly their crucial security systems, would require that a large area of the property be dedicated to solar panels.

Read more...
Insuring thatched roofs against lightning
August 2019, DEHN Africa , Security Services & Risk Management
Considering South Africa’s very high lightning flash density statistics, and the popular trend all over the country to use aesthetically pleasing thatched roofs for residential as well as commercial buildings, a fit-for-purpose offering has been introduced by DEHN Africa.

Read more...
Know your enemies (and friends)
August 2019 , Security Services & Risk Management
Hi-Tech Security Solutions spoke to Dave Rampersad to find out about what and how information can be automatically added to number plates to proactively improve the security of an estate.

Read more...
Residential estates: Just how secure are they?
August 2019 , Security Services & Risk Management, Residential Estate (Industry)
While estates may seem a refuge from the criminal threat lurking in the suburbs, crime may be rife here, too.

Read more...
Reduce insider threats with thorough due diligence
August 2019, iFacts , Security Services & Risk Management
Outsourcing critical business functions can offer significant opportunities, but can also represent a wealth of additional risks.

Read more...