Security Conversation for CEO’s & the Board Members

Cyber security has become top-of-mind for boards of directors, surpassing concern for business competition and financial risk. The heightened urgency has driven a gap between board members and IT security teams as they navigate threats. These findings come from a new pool of research conducted by Osterman Research. Their goal was to learn more about...
Learn More

The “Cloud”, considerations for security.

Addressing Cloud Computing Security Issues and Challenges Addressing cloud computing security issues and challenges is a complex subject.  It all stems from the fact that when you store your files in the cloud, you are storing them on a computer that is owned by someone else.  We will take a look at the security considerations,...
Learn More

Let’s build a Human Firewall

It is often the illusive “Human Factor” that ends up being the weakest link that makes cyber-attacks and data breaches possible, sometimes even more so than hackers exploiting zero-day system vulnerabilities or employing new malware. Let’s be honest, what is easier to hack, a network based security appliance or a human being? According to the 2016...
Learn More

Fake job Ads

Please be advised to be extremely cautious when applying for jobs following reports of people having their identity ‘stolen’ when responding to fraudulent job ads. Scammers are understood to be posting fake job ads in newspapers and on recruitment websites. These scammers aim to obtain personal details such as bank and passport details so they...
Learn More

Cyber-crime, Social Engineering, and You: Staying on Guard (Even When You’re Not)

With special thanks to Kylie Watson, Sociologist: Digital Innovation Specialist, for this article. It goes without saying that the majority of people reading this article are on guard against identity theft when they’re online. They’re looking for secured connections when inputting information like credit card info, they’re vetting the sites they shop from, they’re abstaining from...
Learn More

Addressing the real vulnerabilities

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits these vulnerabilities. We have automatic patching systems to fix vulnerabilities. We implement next generation detection and remediation devices to identify and stop attacks. This is all important, but what’s missing is a recognition that software vulnerabilities aren’t the most...
Learn More

Humans in cyber security – the weakest link

The cyber security of any organisation can only ever be as strong as its weakest link. The biggest vulnerabilities of a system are not necessarily found within hardware or software, but rather with the people who use it. IBM’s 2015 Cyber Security Intelligence Index reports that 95% of cyber security breaches are due to human...
Learn More