Response Readiness

Detection and response to cyber attacks includes the capability to detect an attack that has already succeeded in getting past your existing defences in order to respond to such an attack effectively, and to ensure that it can never happen again. Detection and Response is your best defence against attackers using innovative tactics or a zero-day exploit no one has seen yet. Any gulf between detection and response means that organisations are missing a vital window of opportunity to stop attacks before attackers reach their objective, which could include server encryption, data exfiltration, and ransomware deployment.

Why ransomware attacks are so successful

Ransomware attacks have risen drastically in the last two to three years and have become more successful with each new strain of ransomware. Before answering the question of why ransomware attacks are successful, we need to consider what ransomware is and how it works.

Continuous Response Methodology

There are frameworks available that will equip you to understand where you sit in the threat landscape, who might target you, why and how. Such frameworks help you craft a security strategy that combines your knowledge of the threats you face, how you should structure and support your ecosystem for detection and response, and align these with your board’s overarching goals and objectives. It can guide the incremental improvements you make to continuously assess your security. Your board is likely to know where and how technology fits in to your long-term business and growth strategy. Crucially, you need to factor in how these plans affect your risk profile.

The importance of keeping websites updated

Business owners typically work hard at ensuring that they have compelling and engaging websites but may tend to forget about the ongoing maintenance that any good website requires. This can have serious consequences from a security point of view which could not only result in the loss of reputation but also the need to start building the site again from scratch if backups were not kept.

Partner Services from F-Secure

According to a recent survey by F-Secure, 75% of organisations are using outsourced or a managed service approach to their cyber security rather than purchasing singular products. Janne Pirttilahti, VP of Products & Managed Services at F-Secure shares his thoughts on the partner services that they are offering to help build your cyber security service offering.

Trending News

Lokibot Malware on the Rise
LokiBot—also known as Lokibot, Loki PWS, and Loki-bot—employs Trojan malware to steal sensitive information such as usernames, passwords, cryptocurrency wallets and other credentials. This malware is especially dangerous as it is able to steal credentials from password stores capture input (keylogging) and also functions as a backdoor into an infected system, allowing hackers the ability to install additional payloads (malware, trojans, ransomware, etc.).

Critical severity Windows patch alert – Zerologon (CVE-2020-1472)
The USA’s Homeland Security cybersecurity advisory unit issued an emergency alert to US government departments on 19 September 2020 after the recent disclosure of a “critical”-rated security vulnerability in server versions of Microsoft Windows. The Cybersecurity and Infrastructure Security Agency (CISA), issued an alert requiring all federal departments and agencies to “immediately” patch any Windows servers vulnerable to the so-called Zerologon attack, citing an “unacceptable risk” to government networks.

Experian Data Breach
Near the end of August 2020, Experian, a credit reporting company, reported a data breach exceeding 24 million records of personal information belonging to South African consumers and businesses.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team