If the hackers don’t get you, the regulations will!

Securing your company’s supply chain is always at the top of any IT manager or CISO’s to-do list – if it isn’t, it should be!
How safe our world will be tomorrow depends on the choices we make today. Join the WithSecure Webinar on this subject on 29th February.

South Africa has become the hub for Cybercrime in Africa

A recent report from Interpol on cyber threats in Africa has revealed that South Africa has now become the hub of cybercrime in the continent. South Africa also ranks third globally for the number of victims being affected by cybercrime. This emphasizes the requirement for cybersecurity measures, according to Darren Hamburg, ICT engineer at NNQ Systems.

South Africa the most Internet-Addicted country in the World

Ransomware, the internet’s “dark underbelly” is plaguing South Africa as the most targeted nation in Africa for these cyber-attacks, according to the South African Council for Scientific and Industrial Research. The country’s cyber strategy is also critically underfunded still with the government lacking a clear position in cyber governance debates according to an article by Kevin Poireault in Infosecurity Magazine.

WithSecure launches Cloud Security Posture Management

Most enterprises operate hybrid, multi-cloud networks which are complicated to defend. Furthermore, Gartner predicts that “through 2025, 90% of the organizations that fail to control public cloud use will inappropriately share sensitive data.”
WithSecure’s Cloud Security Posture Management (CSPM) service performs the configuration checks necessary to assure security, and communicates the results and recommendations to you in an actionable form.

Cybersecurity often out of sync with business goals

Aligning cybersecurity with business outcomes is a challenge facing nearly all businesses. 97% of respondents’ organizations face challenges in trying to align cybersecurity priorities with business outcomes, according to a commissioned study conducted by Forrester Consulting on behalf of WithSecure™ .

Predictive analysis can reduce risks associated with data breaches

Thanks to the increasing professionalization of cyber crime, predicting the actions of attackers based on profiling is becoming more challenging for cyber security practitioners. To help address the challenge, WithSecure™ has published a new study that demonstrates an alternative model of predicting how attacks unfold.

WithSecure at ITWeb Security Summit in Jhb in June

The ITWeb Security Summit on 4th and 5th of June this year at the Sandton Convention Centre, Sandton, Johannesburg will have a WithSecure stand and speaker again at the event. As a proud Gold sponsor, ITWeb is offering Cybervision a special 20% discount for attendees at the Summit. Please contact the ITWeb Events Customer Services Manager, Lindiwe Sibeko, to claim your discount, lindiwe@itweb.co.za, +27 11 807-3294 and mention that you had been requested to this by Cybervision.

Trending News

New version of DarkGate malware hunts like a Duck but bites like a RAT
The WithSecure Detection and Response Team (DRT) received an alert regarding spoofed process injection with abnormal memory characteristics on a host belonging to a WithSecure Countercept MDR customer.

Multiple vulnerabilities in eLinkSmart padlocks
Locks serve as our mundane companions, guarding against our shared fear of intrusion. In some places, the humble lock is gradually being replaced by its smart counterpart – one that’s embedded with electronics, wielding the power of keyless entry.

AnyDesk Incident Response 02/2024
Following indications of an incident on some of our systems, we conducted a security audit and found evidence of compromised production systems. We immediately activated a remediation and response plan involving cyber security experts CrowdStrike.

The Mother of all Breaches has revealed 26 billion records
Data from numerous previous breaches was contained in the supermassive leak with an astounding 12 terabytes of information that spans over 26 billion records, according to an article by Vilius Petkauskas, depuity editor at CyberNews.

Cyberattacks on energy infrastructure in South Africa ramped up
Electricity grids have become the prime targets of hackers, terrorists and rival nations with digital technologies inextricably intertwined in the running of critical infrastructure, according to a recent article by Yunus Kemp of ESI Africa.

February 2024 Threats Highlight Report

  • Hackers claiming data theft on TransUnion and Experian
  • Data breaches in the financial sector of SA
  • Ransomware attacks on African businesses
  • The consequences and steps to take after experiencing a data breach
  • The cybercrime trends to watch out for in 2024

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team