User lock-down or education? Cybersecurity issues in a rapidly evolving landscape

User lock-down or education? Cybersecurity issues in a rapidly evolving landscape

User lock-down or education? Cybersecurity issues in a rapidly evolving landscape.

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber capabilities and this means that, in turn, they must also recognise and manage the associated risks, or make themselves vulnerable to large-scale events with significant disruptive consequences.

Anton Jacobsz, managing director at Networks Unlimited South Africa, says, “There has been so much evolution in this arena that the cybersecurity of the old days is not the security of today, when we have so many different teams looking at so many angles of the data. Right across the security network, solutions need to be based on next-generation thinking, such as authentication, finger printing and the two-token system. The market needs to understand that threats do not come only from the outside – advanced threats also attack from the inside.

“Security today does not mean just your firewall – we need to think about the impact of applications security, Distributed Denial of Service (DDoS) mitigation and entry points into your network through e-mails and Wi-Fi, for example. There is a need to cover entry points and exit points: your perimeter means nothing if you don’t have security monitoring traffic to and from the edges. This raises issues such as, ‘Do you lock down your users or educate them?’ and so it can be seen that there is no one solution to the issue of cybersecurity.”

Jacobsz says security experts need to have a dual strategy: one for the network edge and one for the data centre. “However, these were not built to integrate and so bottlenecks are created with a two-phased security at both the edge and the core. You are also dealing with more than one vendor and this brings a multi-phase defence, and the need to continuously evaluate your environment. We also have to look at issues such as capex vs opex models in servicing, and what products to use and how to fund them.

“From a trend perspective, Gartner has predicted that in time, we’ll see mergers and acquisitions resulting in just three or four big security vendors, selling hosted services and offering massive data centres and very large teams in order to provide those services. Another trend that we see in the future is the ongoing rise of digitisation and the Internet of Things (IoT), and with it the mindset of instant consumption from your consumer-based clients. In turn, this means that from a security perspective, you need to know what you want to secure, and where. For example, a bank needs to be able to secure everything on the network to make it unappealing to the would-be thief.

“Finally, I think the biggest trend we will see in our market in the next two years is the onset of requirements around the Protection of Personal Information Act (PoPI), and how this legislation is set to change what businesses can do with customer and corporate data.”

Under PoPI, any business that holds customer or client data is responsible for securing that information. In order to prevent confidential personal information from being stolen or compromised, companies must ensure that they have put in place technical measures to protect the information that exists within the organisation, such as network firewalls, disk encryption for all hard drives, antivirus and anti-phishing software, and strong password protection.

Jacobsz says, “Customers should ask themselves the following when investing in security infrastructure and software: what do we need to protect, and why; how do we want to protect it; where is the highest risk; how do we weigh up costs versus security mitigation; is the business actually willing to invest in cybersecurity in order to protect itself; how much data do we need to protect; can we store off-site; how easy is it to manage our network security requirements; and can we outsource our network security? The question of liability, as per the looming requirements of the PoPI Act, needs to be implicit in all of these aforementioned issues.”

Against these concerns, Jacobsz clarifies that Networks Unlimited offers solutions at all stages of network security, including offerings in the realm of DDoS, advanced threats, prevention and response, next generation firewalls, next-generation deception-based tools, ransomware, phishing and Wi-Fi security.

Networks Unlimited partnerships in the cybersecurity realm include the following:
· Network security and network monitoring products, to protect networks from denial of service attacks, botnets, computer worms and attacks aimed at disabling network routers.

· Unified threat management to deliver solutions that improve performance, increase protection and reduce costs.

· Comprehensive phishing defence solutions to condition users to recognise and report attacks, while working to reduce phishing-related breaches by speeding the collection and response of phishing threats in real time.

· Intelligence-driven security solutions that give clients the ability to detect, investigate and respond to advanced threats, confirm and manage threats, and prevent IP theft, fraud and cybercrime.

· Encryption, advanced key management, tokenisation and privilege control to protect and manage data, identities and intellectual property as well as meet regulatory compliance.

· Deception-based platforms which exercise deception-based detection throughout every layer of the network stack, enabling efficient detection for every threat vector, ultimately deceiving attackers into revealing themselves and thus closing the detection deficit.

Jacobsz concludes, “It can be clearly seen that we cannot define security as falling into just one area, but rather it requires attention to many areas. This brings with it the need for multiple interactions across partners and the need for seamless communication and seamless data sharing. Collaboration is most definitely on the rise, which can only be a good thing as the threat landscape itself keeps evolving in complexity.”

Staff Writer

Powered by WPeMatico

Bitcoin is not really money and Visa wont touch it says CEO

Bitcoin is not really money and Visa wont touch it says CEO

Alfred Kelly, CEO of Visa.

In an interview with CNBC, Alfred Kelly, the CEO of credit card giant Visa, revealed that he believes that Bitcoin – the world’s largest cryptocurrency – is not really money and Visa won’t touch it.

During the interview, which was recorded at the National Retail Federation conference in New York City, Kelly said, “I don’t view it as payment system player. We at Visa won’t process transactions that are cryptocurrency-based. We will only process fiat currency-based transactions.” Fiat currencies, such as the U.S. dollar, are issued by governments as legal money.

This is where the differences come in as Bitcoin is not issued by anyone but rather it’s “mined” or “discovered” by powerful computers around the world competing with each other to solve certain algorithms. The miners then write those transactions to the online blockchain ledger, where all activity is recorded and shared with everyone, according to the CoinDesk description.

“My take is that bitcoin is much more today than a commodity that somebody could invest in; and honestly, somewhat of a speculative commodity,” said Kelly, who became the chief executive of Visa in December 2016.

This view is backed by the volatility of the Bitcoin market. The market which soared to record high of $19 000 per Bitcoin in the later parts of 2017 was quickly brought back down to earth as its value has dropped to half of that high at the beginning of 2018

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico

How telcos can use technology to address #Datamustfall

How telcos can use technology to address #Datamustfall

How telcos can use technology to address #Datamustfall

The South African telecom industry is marked by high SIM card penetration (160%) due to the popularity of broadband services. According to GSMA, average mobile broadband connection in South Africa is 74 persons per 100. Yet it is also one of the markets with one of the most expensive data tariffs in Africa.

A report by Research ICT Africa (RIA) shows that data tariff in South Africa is one of the highest in the top six African markets. In South Africa, the average data tariff is $7.6 per GB, which is much more than that of the second most expensive market Kenya (at $4.9 per GB).

The same report suggests that data tariff in the country has not changed much since 2014. Vodacom and MTN, which together corner 78% of the market share in South Africa, charge over R150 for one GB of data (MTN charges R160 and Vodacom R150). Telkom, which is partly state-owned, has slashed its data tariff substantially. It now charges R99 for one GB data.

Even at R99 offered by Telkom, data tariff in the country is too high for most consumers comfort. In RIA’s Africa Mobile Price Index, even the Telekom’s cheapest R99 per GB tariff ranks 16th(out of 47 countries) most expensive.

A key reason for the high cost of mobile broadband is the high capital expenditure of setting up and managing a network. Besides, high cost of power, which is used to run the cell sites also adds to the expenditure of the telcos.

South Africa’s high tariff rates, which activists believe is above the international ‘norms,’ has led to a unique campaign, #DataMustFall, under which activists are protesting outside the offices of telecom service providers asking them to cut data prices.

The protests did get the attention of both the regulator, the Independent Communications Authority of South Africa (ICASA) and the telecom players. Reacting to the protests, ICASA said that it is looking into the issue of how to address the high cost of communication, including data costs, in the country. It is also in consultation with regulators like the Competition Commission and the National Consumer Commissions to find ways to bring down data cost.

Telecom companies also paid heed and promised a reduction in data prices. Vodacom reduced the out-of-bundle rate of R1 per megabyte to 89c for post-paid customers 1 October 2017.

The protests have rightly brought focus on the high cost of data despite high data demand. According to an ICASA report, mobile data traffic increased significantly by 55% in 2016. However, it failed to acknowledge the fact the telecom sector in the country faces significant challenges due to policy and infrastructure constraints.

Group CEO of Vodacom Shameel Joosub in a press statement admitted that lack of access to spectrum is hampering their ability to drive down infrastructure costs and in turn, enable preventing them to pass savings to the consumer.

Get the Virtualisation advantage
The telecom industry needs to take the demand of a lower tariff seriously and look for cost-effective technologies to provide affordable data services. Technology disruptions, like cloud, virtualisation and other software-driven approaches are already helping telecom companies save cost on equipment and energy.

One of the key selling points of Network Functions Virtualisation (NFV) is that it promises better energy efficiency resulting from consolidation of resources and dynamic utilisation of the same. This feature is especially relevant for the South African operators because of the high cost of energy in the region.

Typically, servers use a very low physical server capacity. Virtualising the server would not only save space but also make the system much more energy efficient. Virtualising the systems hardware would also help save on equipment cost.

Generally, telecom companies invest a fortune in hardware to run data centers. They, thus, incur a lot of cost in procuring, installing and operating massive specialized network hardware. Not just cost, physical hardware also increases response time and reduces the overall efficiency of the system.

Essentially, NFV enables telcos to add agility and flexibility to the network leading to an overall simplified network. This in turn allows them to rollout services at a faster rate. Virtualisation also allows telcos to be flexible towards the need of the customers by being quicker in response to their demands.

South African service providers can also use automation for network maintenance to bring down their cost of network management. Virtualisation allows automation of different components across the network enabling service providers to best utilise their resources. Greater visibility and control of the network also leads to better security.

By shifting the physical hardware on to a virtual platform, companies would not just save a lot on capital expenditure but also increase the overall efficiency. Some estimates put the savings in capital cost to as much as 60%.

Last but definitely not the least is the opportunity for the telcos to increase their revenue by overhauling their networks. It allows them to better address the consumer demand for mobile broadband. As the quality and reach of services improves, the consumption is sure to go up, further allowing them to bring down the tariff.

The concept of virtualisation is a key part of telco transformation and enables the service providers to simplify the networks while enhancing their efficiency. The South African telcos would need to adopt technology solutions in line with the concept of virtualisation to save cost in the immediate future and to pass on the benefit to their customers in the form of cheaper data tariff.

By Lux Maharaj, Director, Africa Sales at Parallel Wireless

Powered by WPeMatico

Samsung scraps Nigerian manufacturing plant plans

Samsung scraps Nigerian manufacturing plant plans

Samsung scraps Nigerian manufacturing plant plans.

On Thursday 18 January 2018, Samsung revealed that the company will no longer look to establish a manufacturing plant in Nigeria because its market share in the country is not big enough.

The revelation was made by Sung Yoon, chief executive officer of Samsung Electronics, Africa during an interactive session with reporters in Lagos.

Samsung will also reportedly be reducing their investments in Nigeria by shutting down the Business to Business (B2B) Unit and the Corporate Social Responsibility (CSR) Unit.

Yoon, during the interactive session, also claimed that manufacturing a mobile phone requires 400 components and that none are available in Nigeria. He added that although Samsung was the leading consumer electronic company in Nigeria, its share of the Nigerian market is smaller to South Africa’s. In South Africa, the company’s smartphones market size is 80 percent, but is significantly lower in Nigeria, according to Yoon.

Other issues that affect the building of manufacturing plant in the country are infrastructure, return on investment (ROI) and grey market. “We are trying to be a local company here. Building factory depends on return on investment and efficiency of the economy. There are lots of grey products coming into the country and this will affect the return on investment,” he said.

He said that the company had manufacturing plants in Vietnam, China, South Africa and Korea, hence, having one in Nigeria is a thing of the future. Yoon said Nigeria’s population of 180 million was a power for the future, a reason why Samsung wanted to be part of the corporate citizenship.

Samsung Africa’s vision was to be the most admired brand, through partnership and profitable growth, concluded Yoon.

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow on Twitter

Powered by WPeMatico

Watch 30 minutes of Monster Hunter World gameplay

Watch 30 minutes of Monster Hunter World gameplay

Watch 30 minutes of Monster Hunter World gameplay.

The third and final beta for Monster Hunter World had begun on Friday, January 19, 2018, at 2 a.m. (UTC) and will conclude on Monday, January 22 at 1:59 a.m. (UTC).

The download client, for the PlayStation 4 beta, was made available to players for pre-load two days ahead of the start of the beta on the 17th of January 2018.

In regards to content for the beta, Capcom stated that: “For this third and final round of the beta, we’re adding a new quest featuring the fearsome Nergigante! Take this last opportunity to dive into the new world of Monster Hunter ahead of the game’s release!”

Our overall experience with the beta was rather great. Granted, Monster Hunter World has a steep learning curve; however, after a few practice sessions, you will find yourself wanting to take on the biggest, baddest monsters in the game.

Monster Hunter World’s performance was impressive, during the beta, when running on the PlayStation 4 Pro. The game ran at a solid pace with little to no drops when running in ‘Prioritise Graphics’ mode.

By: Darryl Linington
Follow @DarrylLinington on Twitter
Follow on Twitter

Powered by WPeMatico

IBM Cloud now connected to BT’s ‘Cloud of Clouds’

IBM Cloud now connected to BT’s ‘Cloud of Clouds’

Keith Langridge, vice president of network services at BT.

BT has announced the launch of a new service to provide global businesses with direct access to IBM Cloud via the BT network on Wednesday 10 January 2018. BT Cloud Connect Direct for IBM offers businesses the benefits of network performance when building and deploying business applications and data on the IBM Cloud.

With Cloud Connect Direct for IBM, BT customers receive a connection to the IBM Cloud so they can access services including compute, network and storage infrastructure as well as an extensive catalogue spanning AI, Blockchain, Internet of Things (IoT), data and analytics capabilities. Direct cloud connectivity helps businesses achieve better performance, security and availability compared to connecting over the open internet.

Cloud Connect Direct for IBM is being delivered into IBM Cloud data centres in the UK via IBM Cloud Direct Link, a network service designed to secure and accelerate data transfer between private infrastructure and the public cloud. This will be followed in the coming months with direct connectivity into IBM Cloud data centres in mainland Europe, the US, Australia and Asia, optimising performance and compliance for customers in those regions. Cloud Connect Direct for IBM will be managed and supported from a single BT-managed service desk, providing proactive management and quality of service.

Keith Langridge, vice president of network services at BT, said: “Cloud Connect Direct for IBM is designed to help businesses fully harness the potential of high-value digital services delivered via IBM Cloud. Businesses deploying IBM Cloud services can now benefit from improved performance, security and reliability, creating a rich digital experience for their customers and employees.”

Kit Linton, vice president of network, IBM Cloud said: “Enterprises are rapidly turning to the cloud to modernise their core applications and build cloud-native solutions that leverage AI, IoT, Blockchain and more. The collaboration with BT will help enterprises around the world seamlessly connect to the IBM Cloud so they can maximise their data and generate new business value.”

Cloud Connect Direct for IBM leverages BT’s global network reach, spanning 198 countries and territories. The service is designed, implemented and supported as part of the customer’s existing network infrastructure. This means less redesign, less change and more consistency with existing network practice when connecting to new cloud services.

Cloud Connect Direct for IBM is available to customers globally today. Cloud Connect Direct for IBM is the latest development in BT’s Cloud of Clouds portfolio strategy, which has been helping customers since 2015 on their digital transformation journeys by connecting them easily and securely to a world-class ecosystem of cloud services, applications and data.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Execution is key to digital success

Execution is key to digital success

Monique Williams, Hyland Southern Africa Regional Manager.

Many companies have enjoyed significant efficiencies from partial digitisation in recent years, but there’s still a lot of paper flying about many everyday offices. Most agree that achieving truly paperless processes would greatly impact business and enhance customer service. However, many find the idea of implementing the tools they need to achieve digitisation daunting.

But it doesn’t have to be. Enterprise content management (ECM) does most of the hard work, allowing digitised documents and files in a wide range of formats to be searched, managed and made available to staff across the organisation, often automatically. While the path to success may be manageable, the outcome of a digitisation project will be significantly enhanced by addressing some fundamental issues.

Step 1: Know what you want
It’s important to have a clear vision of exactly what you want from your ECM solution – as well as why. What specific processes are too complicated or paper-heavy in the business? What problems would your ideal solution solve? Could platform capabilities including ECM, assist one department or be extended throughout the organisation?

ECM is about streamlining as much as it is about organising. Setting out what you want from an ECM solution is a good way to re-examine where business processes can be automated, attenuated and ultimately made more efficient.

Step 2: Know your users
Once you have a vision of a new digital way of working, you will need to think about implementing it from a practical viewpoint. Many IT projects fall short of their full potential because they are not widely adopted by staff. It is essential to keep staff on board during the planning and implementation stage and, in particular, key team members.

A good approach is to involve the people who will actually be using the system from the very beginning. Talk to them, find out what their challenges are and ask for their input and ideas. This helps build end-user buy-in and vastly increases the chances of achieving full adoption once the technical installation is complete.

Allow key staff to become ‘champions’ of the new technology, experimenting with it at an early stage and developing uses for the system within their area of expertise of work.

Early buy-in across the organisation will not only spread the idea and generate usage scenarios, but will also increase user adoption once the system is implemented. You will, therefore, end up with a system that uses technology for the benefit of company and staff, rather than an imposed solution that resourceful workers will rapidly bypass.

Step 3: The end game
Whenever you consider a business-wide system change, you should keep in mind how it will affect your staff. Empathy is key here. Remember that your end users may not care about projected cost savings. What matters to them is the efficiency they can achieve to complete tasks faster, which allows them to spend their time on more satisfying and valuable work.

Appropriate planning, vision and engagement are key to swift adoption across the business. Target quick wins, thereby building staff confidence and belief in the new approach.

As the new way of working evolves and customer trends are taken into account, the system will become flexible enough to allow even more business processes to be automated or changed into more appropriate digital formats.

By Monique Williams, Hyland Southern Africa Regional Manager

Powered by WPeMatico

9mobile fights illiteracy with short film, closed

9mobile fights illiteracy with short film, closed


In furtherance of its commitment to promoting education and raising the level of literacy across the nation, the telecommunications company, 9mobile, has gone one step further, with the production of a short film titled Closed. The film, focused on fighting illiteracy, has been aired on the DSTV platform.

Closed is produced as part of the footprint of the telecom’s flagship pan-African literary prize, 9mobile Prize for Literature, and it seeks to raise awareness of illiteracy as a huge societal problem, as well as inspire collective positive action to stem it.The production and airing of the short film also further affirms 9mobile’s unwavering commitment to innovation in solving social problems, one of which is low literacy as affirmed by the United Nations Educational, Scientific and Cultural Organisation (UNESCO), which estimated that over 65 million people in Nigeria are illiterate.

While Speaking on Closed, Vice President Marketing, 9mobile, Adebisi Idowu, said the short film points to the power of words and how they unlock meaning for people who can read.“At 9mobile, we recognise that the ability to read and appreciate the written stories around us is a gift that over 65 million Nigerians are deprived of. Celebrating literacy begins with acknowledging this issue and that a lot needs to be done to address the problem in Nigeria. That is why, annually, we celebrate the written word through the 9mobile Prize for Literature, the first ever pan-African prize celebrating first time writers of published fiction books. The prize aims to serve as a platform for the discovery of new, creative talent out of the continent and invariably promote the burgeoning publishing industry in Africa.”

Idowu added that 9mobile is committed to continuously innovate ways to reduce illiteracy in Nigeria, thereby supporting government in achieving the United Nations’ Sustainable Development Goal 4, which is ensuring inclusive and quality education for all and promoting lifelong learning.

Closed tells the story of a young man – Juwon, an illiterate but skillful welder, who is cut off from the world around him and unable to appreciate a precious gift he holds just because he cannot read. But as the story unfolds, viewers step into his world, cheering him on as he overcomes the taunts of primary school pupils to learn the rudiments of the English language, until he eventually conquers this challenge in a dramatic way, and acquires the ability to read.

Juwon’s transformation is profound, as the messages written on billboards along the highways that he commutes to and from work, which previously appeared cryptic to him, suddenly become clear.An elated Juwon reads one of the billboards, which has the inscription: ‘See the world differently’ and then he frantically pulls out of his pocket the photograph of a young lady, which had triggered his pursuit of knowledge, and realises that he can finally read the message written on it: ‘I love the man I see in you!”

That moment sparks a flurry of emotions as the film ends with the message: ‘For 65 million Nigerians, illiteracy robs the world of meaning. Spare a thought for them.’Since it made its debut, Closed has won accolades as a masterpiece in creativity. The film won four awards – three Gold and a Bronze – at the 12th Annual Lagos Advertising and Ideas Festival (LAIF) Awards held recently. They include Gold in Film Craft – Best Production and Art Direction, Gold in Film – Corporate Image, and Gold in Film – Promotions Editing as well as Bronze in Film Craft – Best Film Editing.

Earlier in the year, it also received a resounding applause at the grand finale and award ceremony of the 2016 edition of the 9mobile Prize for Literature, where it was premiered.

Powered by WPeMatico

Emergency Communication Centres in 36 states ready soon, says NCC

Emergency Communication Centres in 36 states ready soon, says NCC

Director, Technical Standards, NCC, Dr Fidelis Onah

The Nigerian Communications Commission (NCC) says the Emergency Communication Centres across the 36 states of the federation will soon be completed.

The Director, Technical Standards, NCC, Dr Fidelis Onah made this known to the News Agency of Nigeria (NAN) on the sidelines of the 90th Consumer Outreach Programme of NCC in Aba.

NAN reports that the centres were intended to bridge the communication gap between different emergency response agencies in the country.

Onah said NCC was consulting with the National Security Adviser and state governors for the completion of the centres to ensure they were not duplicated by state governments.

He said that the centres had already gulped over N10 billion.

In response to a question asked by Chief Fabian Nwankwo, Abia Commissioner for Science and Technology, Onah said that research had shown that telecom mast was not dangerous as thought.

He said that although they emit radiations, the radiation was not “ionised”, adding that masts were located after proper scrutiny by NCC and Ministry of Environment.

Onah said that the problems state governments face as regard fee payment by telecom operators often arose from the duplication of the fees by state governments.

He, therefore, urged the state governments to merge the different service fees to make the fee easy for the operators to pay.

Speaking at the event, The Director, Consumer Affairs Bureau, (CAB), NCC, Mr Abdulahi Maikano said the forum was meant to bring Abia telecom stakeholders together to proffer solutions to their challenges.

He said the forum sought to educate stakeholders on contemporary issues and to get feedback which would help in regulating the sector.

Maikano, represented by Deputy Director (CAB), Mr Ismaila Adedigba urged the service providers to provide consumers with various initiatives meant to protect, inform and educate them..

Powered by WPeMatico

Using cyber intelligence to catch cybercriminals

Using cyber intelligence to catch cybercriminals

Using cyber intelligence to catch cybercriminals. (Image Source: ).

The story of a local bank being taken for R300 million by cyber criminals who had 100 people withdrawing money from ATMs in Japan made the headlines. But South African companies, unlike their US counterparts, are not required by law to report cases of cyber theft so how many more have gone by unmentioned? The bank reportedly never got its cash back so it’s still wise to secure your systems from attack; the more proactive the better.

The likelihood of cyber attackers plundering your vaults is already vast and growing daily. The threat landscape today is highly sophisticated but our defences are typically out-dated and reactive systems. That’s because today’s hackers are often young professionals who work for organised crime syndicates and in many cases they target specific, high-value organisations.

A colleague from IBM, which supplies the i2 Enterprise Insight Analysis solution, worked with the Mexican secret service to combat drug cartels funding organised cybercrime, for example. The cartels have a well of finances the envy of many enterprises so they get the best skills, the best tools, and they have time on their side.

The i2 solution is a sophisticated, next-generation threat analysis solution used by the Mexican secret service, 32 out of 36 policing organisations in the UK, including MI5 and MI6, the FBI, Israel’s Mossad, various military units, and the police in South Africa. It has evolved to be relevant by helping catch bad guys for 26 years and is now commercialised and available for enterprises.

The reason you need it yourself instead of going to the police for help, when they already have this tool, is that they are under-resourced, just as their counterparts are elsewhere in the world. And they have much bigger physical world crime issues on their hands. They are good at kicking down doors. They’re less experienced at hunting cybercriminals who lurk in basements behind packet sniffers, tapped cables, and who make man in the middle attacks on obscure data centres in Brussels back rooms.

But to get the cops to kick in a specific door you must be able to reliably tell them which one. That’s what we’re doing with i2. And we’re helping businesses understand their vulnerabilities at any given moment – as well as giving them the tools to investigate, rapidly find the perpetrators, and give law enforcement actionable insights.

Another fact of cyber attacks is that they almost never materialise out of the blue and they’re almost never successful on the first attempt. They typically occur in stages. The crooks test your defences, fail, and return with new approaches to defeat your static counters. They’re fluid and you’re not, the warning signs are usually there, and we would have seen them had we looked.

We need to keep tabs on insider fraud via structured transactional data, chatter in the deep web in services such as Pastebin, unstructured data in our internal reports, and social media feeds where more human chatter occurs. We wrap that up in a dashboard that’s easy and quick for executives to keep an eye on but into which they can drill as deep as they like to ascertain the precise facts.

Behind the dashboard tiered security with intelligent analyses form sophisticated barriers that help you pivot faster than the bad guys. Tier one firewalls have policies that zap IPs that originate from countries in which you don’t operate. They trap known malware and vaporise it. They trap large attachments for human inspection. At tier two you correlate events. They take care of what’s known as the 5km, one-minute card rule where a single bank card cannot be used to withdraw money from two different ATMs, 5km apart, within one minute of each other.

Once you’ve matured tier two you begin to create the intelligence I’ve spoken about. It’s tier three, human-driven intelligence with automated help that visualises the associations to feed intelligent questioning. And the entire time it’s updating the dashboard vulnerability scenario so the executives can see that cutting security personnel or other resources increases work in progress and cycle times, indicating problems, and demonstrating their exposure in light of legislation such as Protection of Personal Information (POPI) Act.

It’s an approach that helps you find the crooks when they’re still trying to access your systems and helps you feed law enforcement actionable intelligence they can use to kick down doors.

By Tallen Harmsen, head of IndigoCube Cyber Security

Powered by WPeMatico