Summit Cybersecurity Project Frontline Report 2020 launch
CYBER SECURITY

Summit Cybersecurity Project Frontline Report 2020 launch

The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported…

I.T Security Controls
CYBER SECURITY

I.T Security Controls

I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in place to address security risks. A security control can also be defined as an action, a mechanism that we apply to our I.T. infrastructure to either to protect our systems…

Are you an effective Cybersecurity/ I.T Manager?
CYBER SECURITY

Are you an effective Cybersecurity/ I.T Manager?

As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T Manager) to help fast track the process. These professionals when hired most of the time forget the primary role of the business. It’s imperative that security professionals remember that they…

Healthcare Cybersecurity: Are your medical records safe?
CYBER DEFENCE | CYBER SECURITY

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information,…

Understanding DoS and DDoS Attacks
CYBER SECURITY

Understanding DoS and DDoS Attacks

Recently, A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between December 2013 and January 2014 was sentenced to 27 months in prison. Austin Thompson, a.k.a. “DerpTroll,” pledged guilty back in November 2018 after he admitted to being a part of DerpTrolling, a…

Cybersecurity Incident Response Planning
CYBER SECURITY

Cybersecurity Incident Response Planning

As the number of cyber breaches occurring worldwide increases, a number of companies have invested a lot of money in system hardening, user awareness, intrusion detection systems and other technologies to prevent data breaches. BUT is that enough? Even with all the various systems and controls in place, a company can still suffer a significant…

Why Insurance players MUST attend the Cybersec conference!
CYBER SECURITY | INSURANCE

Why Insurance players MUST attend the Cybersec conference!

Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise and relies on trust. The industry has also undergone a tremendous change in the way the business is conducted from risk assessment and underwriting to onboarding, service delivery, and on-going…

Countering Cyber Attacks
CYBER SECURITY

Countering Cyber Attacks

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing…