MSIL/Samas.A Threat Notice

Recommended audience for post: Computer network defenders, system owners and administrators.   What is SAMSAM? SAMSAM (Version 4), also known as MSIL/Samas.A, is a ransomware strain that shares analyses of vulnerabilities on the dark web that cyber actors then use to deploy the ransomware on a network.   How does SAMSAM work? According to MalwareBytes… Continue reading

Read More

Digital era brings a new breed of CIO

Chief Information Officers (CIOs) as we once knew them, are no longer. As technology has evolved and become more accessible and entrenched at all levels of business, so has the role of the CIO.  While the “I” in CIO has depicted a focus on information management, it now points to more. It points to innovation,… Continue reading

Read More

The silly season is high time for dealing with spam and phishing

It’s the silly season, and while most go shopping, cyber criminals go phishing. With the larger volumes of promotional emails hitting inboxes over the festive and back-to-school period, now is the time for companies to step up email management. Phishing: A Sign that it’s the Silly-season “Companies can help protect their users and businesses from… Continue reading

Read More

Make the move to cloud-based data centres safe

The cloud presents opportunities for companies to improve the availability and accessibility to data resources. Cloud storage is also more scalable, allowing companies to accommodate ever-growing data volumes easily and cost-effectively. While cloud-based data centres are less risky than on-premise data centres from a security perspective, they are not without risk. Security 101 for Cloud-based… Continue reading

Read More

OT Security is key to bringing expansion plans to fruition

Effective control and security of operational technology (OT) and industrial control systems are inextricably linked with good corporate governance. Companies could use compliance with legislation and corporate governance requirements to overcome key growth barriers when looking to expand into new territories and to attract outside investors. This is according to Charl Ueckermann, CEO at AVeS… Continue reading

Read More

Security-savvy employees can reduce cyber threats and costs

Security Awareness: Awaken the #CyberAware Warrior Within Employees are often touted as one of the biggest threats to an organisation’s IT security. However, Charl Ueckermann, CEO at AVeS Cyber Security, says they can actually act as a powerful defence against cyber security threats. “Educating employees on cyber threats and how to use IT resources and… Continue reading

Read More

Employees’ social media profiles can put company data at risk

Even for companies that have robust IT Security solutions in place, protecting networks and data is growing increasingly complex as security gaps emerge where they are least expected. With the emphasis on technology to protect data assets from threats from the outside, internal threats – such as a company’s employees – are often overlooked. Gateways… Continue reading

Read More

Job Done: Nearly Every Third Corporate Data Breach Gets Employees Fired

When a data breach strikes, the damage can reach further than a business’s finances, reputation, and customer privacy. A breach can also severely impact the careers of individuals at the company involved. According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META)… Continue reading

Read More

Cyber threats real for industrial automation systems

The introduction of Internet of Things (IoT) into industrial automation environments, in the name of progress, has brought on both operational efficiencies and security risks previously unseen to the manufacturing, engineering, and mining industries. This article explains the risk drivers behind Operational Technology (OT) systems and the need for comprehensive security across the enterprise’s operations: from… Continue reading

Read More