City of Johannesburg’s Ransomware Attack

A data breach was reported by the City of Johannesburg on Thursday, 24 October 2019 which is said to have affected several of their customer-facing systems.

In a tweet posted after 11PM, the city said “The incident is currently being investigated by City of Joburg cyber security experts, who have taken immediate and appropriate action to reinforce security measures to mitigate any potential impacts. As a result, several customer-facing systems – including the city’s website, e-services, billing system – have been shut down as a precaution.”

F-Secure’s Application Control – part 1

Application Control is a premium feature that is integrated into the corporate range of F-Secure’s endpoint protection solutions, and unlike other EPP products, the integration into the endpoint client allows it to provide granular, rule-based control over all of the applications installed.

Emails containing malicious attachments are one of the most common methods used to breach organisations’ security systems and hackers typically implement recognised file formats which, when opened by an unassuming user, then launch their attack as a script or code.

It’s in the fine print

Internet of Things (IOT) devices are starting to saturate markets worldwide like never before. According to Gartner research, the number of connected IOT devices worldwide will surpass 20.4 billion by 2020.

The rapid growth of IOT technology is credited to manufactures taking ordinary, dedicated-function devices & objects, like printers, and implementing smart features which improve accessibility, productivity and usability. This concept extends to other devices too, like cameras (surveillance and photography), televisions, watches, lighting, telephones and a plethora of other things. IOT is quickly integrating into our everyday lives at an alarming rate, but have we given up our privacy and security for the convenience that they offer?

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team