Protecting your workforce

The workforce is any organisation's greatest asset but also its biggest risk. It has never been more important to protect employees from exploitation by external attackers, while also limiting the risk that they pose as trusted insiders.

The erosion of the cyber-perimeter and accelerated shift to virtual workforce models necessitate a new approach that baselines activities and behaviours and protects employees by highlighting anomalies. More importantly, employees have the right to know that personal activities and behaviours that don't directly increase organisational risk, cause cultural conflict, or limit successful operations, remain private and anonymous.

Read more: Protecting your workforce

  • Hits: 46

Insider threat detection for security and compliance

In today’s modern and distributed enterprise, it’s more difficult than ever to proactively combat internal and external threats due to a lack of server visibility in the context of user behaviour, application updates and system configuration changes. Insider threat detection for security and compliance

This lack of visibility into data access, usage, modification, movement, upgrades and IP connections creates gaps in ‘intent’ awareness and fails to identify abnormalities that signal increasing risk, such as application deployments, administrative changes and new users.

Business leaders need to rethink server visibility, detection and protection, especially considering the recent attacks on both businesses and the technology platforms they run. In virtually every successful attack there were obvious abnormal superuser account activities, anomalous file downloads and changes in packaged software processes. These attacks all offered ‘indicators of intent’ that should have triggered elevated risk scores and immediate investigative action.

Read more: Insider threat detection for security and compliance

  • Hits: 37

J2 appoints new national sales manager

As part of its global expansion strategy, cyber security firm J2 J2 appoints new national sales managerhas appointed Roy Alves as its national sales manager.  He will be instrumental in building a cyber security skillset that will enable African businesses to identify and address their cyber capacity needs.  

Having recently worked for Mimecast, Alves has a wealth of experience in the IT security space. He spent more than 12 years educating and building a channel in South Africa and the rest of Africa to support this shift moving from an analogue CCTV to a digital IP surveillance world.

Read more: J2 appoints new national sales manager

  • Hits: 135

Educating remote workers on cybersecurity

Cybercriminals have shifted their focus to vulnerable employees who now work from home and use personal IntJohn Mc Loughlinernet connections. Business leaders need to educate remote workers on cybersecurity and better computer safety practices or risk having their data compromised.

In a recent study by Microsoft, more than 25% of remote workers had personally experienced a cyberattack. This is largely as a result of employers being forced to quickly implement a remote work strategy and still not having the necessary security, privacy and workplace procedures in place to secure this new environment more than a year after hard lockdowns and work from home orders started around the world.

Read more: Educating remote workers on cybersecurity

  • Hits: 161

Malware: the biggest threat

JohnMalware remains the biggest threat to corporate networks, more costly than any other threat including ransomware and Trojans. A research study conducted by Deep Instinct reports on the hundreds of millions of attempted cyber-attacks that occurred every day throughout 2020 showing malware increased by 358% overall.

Emotet maintained its number one position in the Global Threat Index, highlighting the global impact of this malware. The highly destructive banking Trojan remains the top malware as it has already impacted six percent of organisations globally. This malicious spam campaign uses various delivery techniques to spread the malware, this includes phishing emails, embedded links, attachments and password protected Zip files.

Read more: Malware: the biggest threat

  • Hits: 148

Copyright © 2019 J2 Software | Powered By Cartmell