Phishing emails and what helps protect from spear phishing

What helps protect from spear phishing emails scam

What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or trusted sender to induce targeted individuals to reveal confidential information.  As the name would suggest, spear phishing is a type of phishing attack targeted at a small group or individual. Whereas phishing attacks are broad and apply to many people, … Read More

Okta cyber attack: Supply chain attacks on the rise

Okta cyber attack: cloud security Supply chain attacks

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to provide access to their networks have been affected by a cyberattack conducted by the hacking group Lapsus$. Okta said that in a worst-case scenario, 366 of its clients had been compromised and their “data may have been viewed or acted … Read More

Mitigating cyberattacks with IOAs and IOCs

Paper with Indicator of Attack (IOAs) and Indicator of Compromise (IOCs)

IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks is key to business success in today’s digital age. Indicator of Attack (IOAs) and Indicator of Compromise (IOCs) are two important parts of ensuring your network is safe and secure.   IOAs demonstrate the intentions behind a cyberattack and the techniques … Read More

The Rise of Ransomware as a Service

The Rise of Ransomware as a Service

Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in the last 12-months alone. It’s a scary statistic that sends shudders down the spines of security teams around the world who are constantly battling cyber threats. But just why has ransomware become the weapon of choice for cyber attackers? The … Read More

How to define sensitive data and the means of protecting it 

Define sensitive data and how to protect it

What is sensitive data, how do you define it and how to protect it A report revealed that in 2021, sensitive data was the most common target in data breaches. For example, 65% of all sensitive data incidents involve social security numbers (SSN), and 41% of incidents to personal health information because they are valuable targets.   Moreover, most data breaches occur … Read More

Breaking down new SEC rules on cybersecurity risk management

Breaking down new SEC rules on cybersecurity risk management

What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new rules to enhance and standardise disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies.  According to the SEC rules on cybersecurity, proposed amendments to already existing rules would require, among other things, current reporting about material … Read More

Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose networks to ransomware, creating devastating losses that undermine their reputations.  In fact, the past year has seen ransomware attacks take down massive corporations with sophisticated networks. We will explore some ransomware examples and explain what to do to prevent such … Read More

Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.  LDAP is a client-based lightweight version of Directory Access Protocol (DAP). It operates on both private intranets and public networks, and across multiple directory services which makes it the most convenient for authenticating, … Read More

How to protect personally identifiable information from a cyber breach 

How to protect personally identifiable information

In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a high priority target for cybercriminals. For example, There were 1.4 million reported ID theft incidents in 2020, as opposed to 650,000 incidents in 2019.  Driven by the prospect of high prices on the dark web and security vulnerabilities prevalent in … Read More