F-Secure Webinar on vulnerability management & GDPR

Unpatched software vulnerabilities are the number one reason behind data breaches and other IT security issues. Most companies, however, are still struggling to keep up with scanning and patching in an environment with dozens of applications, hundreds of devices and over 16,000 new vulnerabilities discovered each year.

F-Secure will be hosting an interactive presentation on the benefits of vulnerability management.

Why one should invest in cyber security

Cyber incidents ranked as the 2nd biggest business risk internationally according to the results of a recent survey conducted by Allianz Global Corporate & Specialty (AGCS) and based on insight from more than 2400 risk management experts in over 80 countries, including South Africa. Cyber incidents ranked above concerns like natural catastrophes, changes in legislation and regulations, and even fire and explosions. Basically, investing in cyber security for a business can directly impact its bottom line.

Social Media Hacks

The last couple of years have witnessed far too many companies reporting data breaches due to unforeseen circumstances. In most of these scenarios, user data is stolen and used as ransom to extort money from their victims.

Social media has not been ignored in this regard and it is one of the many targeted technologies today.

Backing Up crucial to company success

Data backups are a critical process for the overall operation and prosperity of any business. Having only one backup saved on a single device is not advisable because if it’s tampered with or stolen, all the business data could be irretrievably lost.

A data backup regime should be part of the standard operating procedures for all organisations.

Latest Cyber-Attack Threats

September 2019 has been a month full of surprises. With the return of Emotet, fEstasAzulCorrupta spotted again, more creative phishing campaigns and even more ransomware attacks, it has not been uneventful in the slightest. Here are some of the identifiers to look out for.

Emotet
First launched as a banking trojan back in 2014, Emotet has ‘evolved’ into an email spamming malware delivery system. It’s designed to evade detection by some anti-malware products and spreads between connected computers with its worm-like capabilities, dropping malware wherever it goes.

fEstasAzulCorrupta
This is a computer virus made specifically to corrupt MS Office files. It’s generally packed into compromised software found on file-sharing networks (e.g. torrents) or attached to freeware.

Local Phishing attack
Lastly, we have a credential phishing campaign looking to try to steal MWEB user credentials. It is specifically targeting MWEB subscribers and requests verification to enhance account security with the threat of being unable to enjoy full account access and limited service.

This bulletin is intended to increase the security awareness in organisations by providing useful information to help enhance security and safety when using computing devices and the Internet.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team