CYBER SECURITY

Summit Cybersecurity Project Frontline Report 2020 launch

The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported …

Summit Cybersecurity Project Frontline Report 2020 launch Read More »

Vulnerability Scanning Essentials with Nmap

Cybersecurity analysts can only secure a network when they have good situational awareness of the systems and devices on that network. Nmap, short for “Network Mapper” is an open-source utility for network discovery and security auditing. It is one of the most important tools available for cybersecurity professionals, network engineers, and system administrators to perform …

Vulnerability Scanning Essentials with Nmap Read More »

Leveraging SSH for network security

System administrators, developers, IT support people, and power users all find Secure Shell (SSH) a very useful protocol for connecting to systems remotely over a secure network. Because of its cryptographic nature, SSH is always preferred to other insecure protocols like Telnet and FTP. It is also the protocol of choice for accessing Linux servers …

Leveraging SSH for network security Read More »

Enhance your cyber hygiene in your virtual education/online presence

What’s your worst cyber nightmare? What is your plan to prevent this and should something happen, mitigate it? Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your …

Enhance your cyber hygiene in your virtual education/online presence Read More »

Children Online Safety Awareness Training

Master the art of how to use virtual learning platforms and social networks like WhatsApp safely Are you too secure to be hacked? As schools remain closed and embrace digital learning, hackers are leveraging the panic and confusion to transmit malware and break into computer networks. If you (parent) or any of your children have …

Children Online Safety Awareness Training Read More »

Twitter hacked, as Bitcoin double scheme targets A-listers

Several Twitter accounts of high-profile people and companies were hacked on Wednesday 15th July 2020, throwing Twitter in the unwanted spotlight. This was a high-level coordinated attack aimed at scheming people through cryptocurrency who have already been battered financially by the coronavirus pandemic. According to Twitter, the attack was possible though “a coordinated social engineering …

Twitter hacked, as Bitcoin double scheme targets A-listers Read More »

The value of Social Engineering pen-testing

Penetration testing is done in different ways, apart from other penetration testing processes, Social Engineering is one of the fundamental techniques and methodologies that is so important, which all organizations should embrace to assess their level of resilience towards information security.  As human beings continue to be the weakest link in the security chain, organizations …

The value of Social Engineering pen-testing Read More »

The Value of an IT Budget to your organization

Your data is valuable and should belong to you!! But what guarantee do you have that your online records are owned, accessed, and or reviewed by you alone? Yes, you deserve the right to ownership of your personal/and or organizational records, created and processed by you. Nevertheless, our online records are exposed on an almost …

The Value of an IT Budget to your organization Read More »

#covid19 cyber threats and attack vectors: how to be secure

Criminals attack when they are least expected. As you go about your business, someone somewhere is hatching a plan to steal from you. You must stay ready. #covid19 pandemic has disrupted the world in ways no one could have predicted. People are struggling for survival. A starving man has no option: to fight for survival …

#covid19 cyber threats and attack vectors: how to be secure Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.