Have you “Gone Phishing”?

So, your security perimeter is tight, right?  Your corporate email has advanced threat protection. You have deployed an anti-virus system.  That means you are all good and it is time for you to hang up the sign: Gone Fishing and with not a care in the world.

This might be an effective approach in a world where the people using the devices never leave the office and always and only have access to information when seated safely behind your firewall. It would be great if they never searched for anything online and also never saw a web based advert or used any personal email service such as Outlook.com or Gmail. If all of the foregoing is the case - rest easy and happy fishing.

Read more: Have you “Gone Phishing”?

  • Hits: 332

J2 Software Tackles Security in the Hyper-Connected World

The rapid growth of devices and associated attacks aimed at mismanaged or unpatched devices, in conjunction with unsuspecting users, is proving difficult to keep up with. J2 Software has launched a range of solutions geared to meet these challenges.

“Every day new devices are being added to the corporate environment bringing new threats and vulnerabilities in the picture. This is why we push for visibility of organisations’ entire environment and this must go beyond the corporate network in our modern, hyper-connected society,” says J2 Software MD, John Mc Loughlin.  

He emphasises that systems live in-house and in the cloud with data being accessed and managed on several devices in numerous locations. “Without visibility, you will not even know if something has been lost.

Read more: J2 Software Tackles Security in the Hyper-Connected World

  • Hits: 272

Cyber protection for SMEs

John m

J2 Software has launched a packed solution aimed at helpin SME's get a handle on cyber threats.  Cyber attacks on an SME can have a far harsher long-term effect that larger businesses.  A larger entity will likely have established facilities in place to recover in  the event of a cyber attack.  When a SME is hit; it may take days or weeks to fully recover - that is if they can recover at all.

According to the South African Banking Risk Information Centre (SABRIC)[1], SA ranks third highest in the world for cyber attacks. Whilst there do not appear to be stats on the local SME sector, internationally a report by Deloittes[2] reveals that in Holland, cybercrime costs the Dutch SME sector 1 billion Euro each year. At today’s exchange rate, that equates to R16704 250 000,00. The figure for the Dutch economy as a whole is put at around €10 billion, or 1,3% of that country’s GDP.

J2 Software MD, John McLoughlin, says that not only are these figures staggering but that the local SME sector is not immune to these international patterns. “In South Africa, the security industry in general has left this sector heavily under serviced and thus reduced to implementing in-house initiatives to fight this very real threat.”

Read more: Cyber protection for SMEs

  • Hits: 333

Everything is connected

johnPhysical security is no longer just a case of a high fence and security guards. Everything is interconnected and reliant on readily available information and visibility in order to maintain security installations.

Most businesses have access control systems that are connected to a computer, which often sits outside of the rest of the network. This is part of a bigger network of CCTV, proximity sensors and similar technologies along with the high fences and security guards acting as physical patrols.

All aspects of security are driven by information, and all of this is digital – so by not ensuring that you have the correct cyber-security programme in place all can be lost to a smart cyber-attack. Internet Protocol (IP) phones, cameras, access control are all connected to the Internet. Do you know how much of your footprint is visible to the outside world… and is it secured?

An important point to get out of the way is the ongoing mention of IT security. The name itself is incorrect; if we continue to focus on the words IT security, it means that this field sits purely within IT. This is not the case today. Cybersecurity cannot be done just by IT, it is a specialist field. You would not get an ice cream manufacturer to handle your physical security, so why ask an IT professional to manage your cybersecurity. Both could do the job, but would the outcome be desirable?

Read more: Everything is connected

  • Hits: 401

J2 Software Provides Tips to Help Companies Harness their Users to stop Cyber Threats

J2 Software is embarking on a campaign to assist customers to overcome what has become the biggest cyber security threat to businesses - users.

John Mc Loughlin, MD J2 Software, says insider threats cause the most damage to businesses with breaches leading to destruction of reputation and loss of market confidence.

“I am in almost constant discussion with IT and Security professionals who tell me that their users are the most common source of breaches. I believe it is time to steer away from blaming the users and talk with them so that we can help them become part of the solution,” says Mc Loughlin.

Read more: J2 Software Provides Tips to Help Companies Harness their Users to stop Cyber Threats

  • Hits: 674

Copyright © 2019 J2 Software