classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Being prepared is key to mitigating cyber attacks
July 2018, Cyber Security

In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring solutions as well as preventive tools to try to avoid falling victim to these attacks.

“Over the past few years, we have seen cyber criminals continually tweak their methods, switching from PCs to smartphones to steal confidential information or financial credentials to get their hands on their victims’ money,” says Simon Campbell-Young, MD of Credence Security.

He says the rise of the Internet of Things (IoT) has seen the attack surface widen, and alongside it, cyber criminals devising ways to attack all manner of devices, from smart lighting and security, to cars and medical health devices.

“The first way to prevent a cyber-attack is to be aware, and ensure that all employees are also trained in what not to do. For example, be vigilant, and never click on links or attachments in emails unless you are 100% certain of their legitimacy. Also consider a virtual private network, as this will prevent attacks too.”

Campbell-Young also advises users to be cautious when surfing the Web. “There are many malicious sites that appear to be the genuine article. Always scrutinise the URL for any anomalies that might point to it being an imitation of the genuine article.”

Next he says to protect your smartphone. “Smartphones have become the de facto tool for accessing both personal and business information, as well as conducting finances and other operations. Ensure you have a good mobile security solution installed, and always run your updates as soon as they are available. Also be careful when downloading apps. Don’t download from any marketplaces that aren’t sanctioned, and check app permissions to ensure no app is asking for access to something it simply shouldn’t need.”

Although devices are supposed to be more secure these days, he says users should still be cautious. “Make use of any protective features that come with your device, and practice good security hygiene, irrespective of whether you are on your phone or your PC.”

He adds that the best defence is being prepared. “Take steps to take to protect your most important and confidential data assets in the face of cyber-attacks. Identify the key threats and dedicate security resources and incident management processes to those threats specifically. Also, identify which information is most valuable, and make sure that is first in line for defence.”

Cyber security isn’t just a once off, he says. Cybercrimes happen every day, even to the largest enterprises, which have the best security tools and solutions in place. “To survive in today’s threat landscape, planning and implementation of strategies and countermeasures are crucial. Businesses need to take concrete steps towards understanding, and having the ability to neutralise threats.”

Staying up to date with the threats and vulnerabilities that your business faces can go a long way to preventing or recovering from a cyber-attack, he concludes.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The most important features of a management platform
    September 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
    Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.
  • Nearly every third corporate data breach gets employees fired
    September 2018, Cyber Security, News
    According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.
  • IoT in your home: what are the risks?
    September 2018, Cyber Security
    Put security in place before investing in IoT smart home devices.
  • Threats to control rooms
    September 2018, Contract Surveillance Services, CCTV, Surveillance & Remote Monitoring, Cyber Security
    CSS offers advice for protecting remote control rooms from criminal attacks and interference.
  • The link between passwords and sextortion
    September 2018, J2 Software, This Week's Editor's Pick, Cyber Security
    John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.
  • Modern KPIs for effective cybersecurity
    September 2018, Nclose, Cyber Security
    Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.
  • Ten cybersecurity smart home tips from Ben-Gurion University
    September 2018, Cyber Security
    According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
  • Facing the cybersecurity challenge
    August 2018, Technews Publishing, Cyber Security
    There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?
  • Visibility is security
    August 2018, Cyber Security
    Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.
  • 5 steps to integrating business continuity and cyber resilience
    August 2018, ContinuitySA, Cyber Security, Security Services & Risk Management
    It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.
  • Knowledge and visibility leads to security
    August 2018, J2 Software, Cyber Security
    John Mc Loughlin highlights some key areas an organisation needs to take note of in effectively securing their systems from cyber-attacks in all their different forms.
  • The cyber-skills conundrum
    August 2018, Cyber Security
    A lack of skilled resources is not the only factor behind the cybersecurity workforce shortage, says Rick Rogers, area manager for Africa at Check Point Technologies.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.