African trust centre launches cyber division

November 2019 Cyber Security

Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings to more comprehensively support customers in the ongoing battle for improved digital security.

“LAWtrust has traditionally been focused on defensive technologies. The additional focus on ‘Secure Availability’ moves away from the defensive approach to a proactive stance by assisting clients to determine whether their digital environment is safe or not. Employing the latest in testing tools, cyber-analytics and experienced security analysts, LAWtrust can conduct vulnerability assessments, guide the customer in prioritising the vulnerabilities and assist in remediation,” says LAWtrust’s chief solutions officer, Maeson Maherry.


Maeson Maherry.

According to the South African Banking Risk Information Centre (SABRIC), South Africa has the third-highest number of cybercrime victims worldwide, losing about R2,2 billion a year to cyberattacks.

“Most of the cybersecurity companies in South Africa only service information systems (IT) and not operational systems (OT). Operational systems need to be secured as well, especially in sectors such as industrial or manufacturing sectors, mining and engineering sectors. This speaks to the trend of Industry 4.0 and IoT and continuing automation of all industries. There is a huge shortage of digital security skills in South Africa, leaving the country vulnerable,” says Maherry.

Malware attacks in South Africa increased by 22% in the first quarter of 2019 compared to the first quarter of 2018, according to Kaspersky. While a report from cybersecurity firm Norton says globally, 978 million consumers were affected by cybercrimes in 2017, stealing a total of $172 billion.

“A cybersecurity assessment usually includes vulnerability assessments, penetration testing, architecture reviews and gap analysis against business/compliance requirements which will help the consultant with a comprehensive view. The LAWtrust approach is to focus on the aspects of remediation and information security solutions, that can provide the fastest, and the greatest, advantage to a business in a disruptive but governed environment,” concludes Maherry.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pwn2Own hacking contest to include industrial control systems
October 2019 , Cyber Security
As IT and OT converge under Industry 4.0 and digital transformation initiatives, security gaps are emerging in a range of popular industrial control systems.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
The importance of XDR for cyber protection
October 2019 , Cyber Security, Products
35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.

Read more...
Enterprise security must change
October 2019 , Cyber Security, Security Services & Risk Management
The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users.

Read more...
Kaspersky uncovers zero-day in Chrome
October 2019, Kaspersky , News, Cyber Security
Kaspersky’s automated technologies have detected a new exploited vulnerability in the Google Chrome web browser.

Read more...
Cybersecurity for video surveillance systems
September 2019, Mobotix , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Protecting the outer perimeter with cloud services
November 2019 , Cyber Security
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Read more...
Information security outsourcing service
November 2019, Condyn , Cyber Security
SearchInform launches information security outsourcing service for companies that face the problem of corporate fraud and data leakage.

Read more...