Contact: 087 238 1870

   

J2SECOPS WEEKLY NEWS: This week in the J2 CSC, If awareness worked then no one would smoke…

I’m not sure when last you observed a box of cigarettes? The imagery and wording can be quite graphic, most consumers shrug off these messages to regulation, with little to no effect in terms of dissuasion. So, does awareness really work? Seek a specialist advice if you need help, right?

As with cybercrime headlines and breach statistics published daily on almost every company, independent of its sector or even its size, indicates the urgent need for the adoption and implementation of cybersecurity solutions to improve the reliability of its systems. With little effect. So here is my advice;

To do so effectively, one may turn to external specialized cybersecurity companies that know how to establish information security measures and to stop all sorts of cybersecurity problems.

These days, the fact is that thanks to the collective efforts of all whom are impacted by cybersecurity and crime, the average user now trusts online platforms for their financial transactions more than ever before. So now the ball is in the companies’ court: they must protect user trust by providing secure, cyberattack-resistant ICT ecosystems.
Online payments and financial institutions must be the first to protect this trust and ensure financial cybersecurity within all operations. Effect the Change.

So, without any further delay, enjoy our roundup of stories for this week…


Security Risks Curb The Adoption Of Online Banking

According to the Payments Fraud and Control Survey Report carried out by JP Morgan Chase, a leading global financial services firm, 78% of companies were targets of payment fraud in 2017. The report is based on a survey of corporate practitioners in all kinds of companies in the US and highlights the growing threat of financial cybercrime across the globe and is well worth the read.

Security risks curb the adoption of online banking | Japonica Jackson


Do You Know What's Leaking From Your Enterprise?

An attacker will happily take your data and run if they are able to get around your controls. To paint a picture of it, if you’re standing on the fortress walls peering over the battlements but, you’re letting carts move freely through your gate it could be all over but for the crying. On the other hand, if you are able to intercept and inspect this traffic before it can leave your network you can help to avoid having critical information being exfiltrated from your network. Every machine on your network is talking to you and there is a wealth of data that can be fed into a log analysis solution. Have those logs reviewed and look for traffic that may seem out of place. Make this review into a defined repeatable process to better protect your environment.

If you’re not looking at the traffic leaving your enterprise currently, you might be in for a nasty shock when you finally do.

Do You Know What's Leaking From Your Enterprise? | Dave Lewis


Why Security Configuration Management (SCM) Matters.

In the Godfather Part II, Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM).

By setting a gold standard configuration for your systems and continuously monitoring for indicators of compromise, organizations can quickly identify a breach. Early detection of a breach will help to mitigate the damage of an attack. Using SCM to enforce a corporate hardening standard like CIS, NIST and ISO 27001 or a compliance standard like PCI, SOX or HIPAA provides the ability to continuously harden systems to reduce the attack surface. Hardened systems provide less opportunity for the bad guys to launch a successful attack.

Why Security Configuration Management (SCM) Matters | Brian Jackson