classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Knowledge and visibility leads to security
August 2018, Cyber Security

Following on from the article on threat detection and solutions, John Mc Loughlin, CEO of J2 Software highlights the importance of knowledge in the fight against cybercrime, as well as the importance of visibility into all your systems, processes, digital assets and people. The following pointers are presented as a starting point to improved cyber awareness and security.

John Mc Loughlin.
John Mc Loughlin.

Knowledge is key

Knowing where the risks are is a great step in the fight against cyber-attacks, which must then be continually augmented with live, inline and ongoing user cyber-awareness training. Without helping your users know what they need to be aware of, they cannot be expected to be part of the fight. It is important to not simply shift the blame to the user when you have not taken adequate steps to make them aware of the threats.

Some of the areas that require visibility and actionable intelligence are:

• User activity – both on and off the corporate network.

• Access to in-house and cloud-based platforms.

• Behavioural monitoring of users and the applications they install.

• End-point protection, with correlation to global threat intelligence.

• Email access and usage. This must cater for external and internal email attacks.

• Asset detection and management with ongoing vulnerability assessment to discover where the gaps are before the compromise takes advantage of the vulnerability.

• User cybersecurity awareness that is relevant to the organisations. You cannot expect users to help prevent breaches when they do not know what to look out for.

Visibility is key

As we work in a hyper-connected world, it is no longer good enough to only monitor what happens on the corporate network. You also need to know where your assets are used out in the wild. Breaches from third-party contractors or online applications can lead to your organisation losing data because of poor cyber-hygiene or password reuse. The area of risk is vast and includes:

• The network – as in the physical network with switches, routers firewalls and similar equipment.

• The systems – as in the business applications that run your business. Some of which are in-house and some may be sitting out in the cloud.

• The equipment – as in the computers, laptops, VoIP, mobile devices that your users jump on every day to interact with the systems, customers and suppliers of your business. It is important to know where and what assets are being used across your landscape. It is more important to know whether these are vulnerable to attack and compromise.

• The people – this is the easiest part to hack. The attacker does not need to hack a system; it is far easier to hack a human. Using social engineering and deception it is easy to compromise individuals to part with their knowledge or access credentials.

• The dark web – the cyber underground is where compromised details are shared and traded. This is a critical part of the programme because if you do not know that your corporate records are being traded, you cannot take any steps to close the hole created by these breached records.

A layered solution

Layered, overlapping solutions are required to win the fight against evolving threats. It is not enough to have only a firewall and antivirus solution in place when you do not have any idea regarding access and standard behaviour. Using the layered approach, when one layer is defeated you immediately detect the breach within another. Once detected you then have the capability to update all other layers to make sure the attack is nullified in future. Some of the layers will include, but not be limited to:

• End-point protection with automated updates and behavioural monitoring.

• Inline Domain Name System (DNS) or Internet monitoring and security – on or off the network from any connection.

• Email gateway and internal security measures to identify malicious attacks via email. This must include advanced capabilities to prevent phishing, whaling, impersonation attempts and armoured attachments.

• Backup – managed and monitored backup is crucial. It is also a key aspect to make sure that you have built-in and automated ransomware protection. If it is not the corporate standard, then it cannot be encrypted. Why allow something to take hold. It is cheaper, faster and more convenient to prevent than recover.

• User activity monitoring which must include known and unknown deviations from standard behaviour.

• Network, wireless and machine intrusion detection along with the complementary vulnerability assessments and remediation.

Mc Loughlin concludes: “All of these should be tied together in order to get a single 360-degree view of the overall threat and risk landscape for your organisation. Once you have the knowledge and total visibility, you have the capability to respond. Many of the basic tasks can be automated, which also ensures consistency and immediate reaction.”

For more information contact J2 Software, +27 87 238 1870,,


Tel: +27 11 794 1096
Fax: 086 619 3563
Articles: More information about J2 Software

  Share via Twitter   Share via LinkedIn      

Further reading:

  • The most important features of a management platform
    September 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
    Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.
  • Nearly every third corporate data breach gets employees fired
    September 2018, Cyber Security, News
    According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.
  • IoT in your home: what are the risks?
    September 2018, Cyber Security
    Put security in place before investing in IoT smart home devices.
  • Threats to control rooms
    September 2018, Contract Surveillance Services, CCTV, Surveillance & Remote Monitoring, Cyber Security
    CSS offers advice for protecting remote control rooms from criminal attacks and interference.
  • The link between passwords and sextortion
    September 2018, J2 Software, This Week's Editor's Pick, Cyber Security
    John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.
  • Modern KPIs for effective cybersecurity
    September 2018, Nclose, Cyber Security
    Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.
  • Ten cybersecurity smart home tips from Ben-Gurion University
    September 2018, Cyber Security
    According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
  • Facing the cybersecurity challenge
    August 2018, Technews Publishing, Cyber Security
    There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?
  • Visibility is security
    August 2018, Cyber Security
    Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.
  • 5 steps to integrating business continuity and cyber resilience
    August 2018, ContinuitySA, Cyber Security, Security Services & Risk Management
    It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.
  • The cyber-skills conundrum
    August 2018, Cyber Security
    A lack of skilled resources is not the only factor behind the cybersecurity workforce shortage, says Rick Rogers, area manager for Africa at Check Point Technologies.
  • Nearly every third corporate data breach gets employees fired
    August 2018, Cyber Security
    According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.