classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018

Knowledge and visibility leads to security
August 2018, Cyber Security

Following on from the article on threat detection and solutions, John Mc Loughlin, CEO of J2 Software highlights the importance of knowledge in the fight against cybercrime, as well as the importance of visibility into all your systems, processes, digital assets and people. The following pointers are presented as a starting point to improved cyber awareness and security.

John Mc Loughlin.
John Mc Loughlin.

Knowledge is key

Knowing where the risks are is a great step in the fight against cyber-attacks, which must then be continually augmented with live, inline and ongoing user cyber-awareness training. Without helping your users know what they need to be aware of, they cannot be expected to be part of the fight. It is important to not simply shift the blame to the user when you have not taken adequate steps to make them aware of the threats.

Some of the areas that require visibility and actionable intelligence are:

• User activity – both on and off the corporate network.

• Access to in-house and cloud-based platforms.

• Behavioural monitoring of users and the applications they install.

• End-point protection, with correlation to global threat intelligence.

• Email access and usage. This must cater for external and internal email attacks.

• Asset detection and management with ongoing vulnerability assessment to discover where the gaps are before the compromise takes advantage of the vulnerability.

• User cybersecurity awareness that is relevant to the organisations. You cannot expect users to help prevent breaches when they do not know what to look out for.

Visibility is key

As we work in a hyper-connected world, it is no longer good enough to only monitor what happens on the corporate network. You also need to know where your assets are used out in the wild. Breaches from third-party contractors or online applications can lead to your organisation losing data because of poor cyber-hygiene or password reuse. The area of risk is vast and includes:

• The network – as in the physical network with switches, routers firewalls and similar equipment.

• The systems – as in the business applications that run your business. Some of which are in-house and some may be sitting out in the cloud.

• The equipment – as in the computers, laptops, VoIP, mobile devices that your users jump on every day to interact with the systems, customers and suppliers of your business. It is important to know where and what assets are being used across your landscape. It is more important to know whether these are vulnerable to attack and compromise.

• The people – this is the easiest part to hack. The attacker does not need to hack a system; it is far easier to hack a human. Using social engineering and deception it is easy to compromise individuals to part with their knowledge or access credentials.

• The dark web – the cyber underground is where compromised details are shared and traded. This is a critical part of the programme because if you do not know that your corporate records are being traded, you cannot take any steps to close the hole created by these breached records.

A layered solution

Layered, overlapping solutions are required to win the fight against evolving threats. It is not enough to have only a firewall and antivirus solution in place when you do not have any idea regarding access and standard behaviour. Using the layered approach, when one layer is defeated you immediately detect the breach within another. Once detected you then have the capability to update all other layers to make sure the attack is nullified in future. Some of the layers will include, but not be limited to:

• End-point protection with automated updates and behavioural monitoring.

• Inline Domain Name System (DNS) or Internet monitoring and security – on or off the network from any connection.

• Email gateway and internal security measures to identify malicious attacks via email. This must include advanced capabilities to prevent phishing, whaling, impersonation attempts and armoured attachments.

• Backup – managed and monitored backup is crucial. It is also a key aspect to make sure that you have built-in and automated ransomware protection. If it is not the corporate standard, then it cannot be encrypted. Why allow something to take hold. It is cheaper, faster and more convenient to prevent than recover.

• User activity monitoring which must include known and unknown deviations from standard behaviour.

• Network, wireless and machine intrusion detection along with the complementary vulnerability assessments and remediation.

Mc Loughlin concludes: “All of these should be tied together in order to get a single 360-degree view of the overall threat and risk landscape for your organisation. Once you have the knowledge and total visibility, you have the capability to respond. Many of the basic tasks can be automated, which also ensures consistency and immediate reaction.”

For more information contact J2 Software, +27 87 238 1870,,


Tel: +27 11 794 1096
Fax: 086 619 3563
Articles: More information about J2 Software

  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 cybersecurity crystal ball
    February 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?
  • 50% of companies can’t detect IoT breaches
    February 2019, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
  • Data security sits at the heart of democracy
    February 2019, Cyber Security, Security Services & Risk Management
    A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.
  • Corporate fraud and insider threats
    February 2019, Cyber Security, Security Services & Risk Management
    Insider fraud and theft can often be more damaging to a company than risks from outside.
  • Corporate privacy in a selfie age
    February 2019, Cyber Security, Security Services & Risk Management
    Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.
  • SME cybersecurity: high risk
    February 2019, Cyber Security, IT infrastructure
    Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
  • Kaspersky unveils new partner programme
    February 2019, Kaspersky Lab, News, Cyber Security
    Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
  • Our dependence on cyber-connectivity
    November 2018, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
    The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.