AvosLocker ransomware uses AnyDesk in safe mode to launch attacks
Sophos has released new research about AvosLocker ransomware, explaining how attackers attempt to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool. Windows Safe Mode is an IT support method for resolving...
The greatest asset becomes the biggest risk
It's never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. The erosion of the cyber-perimeter as a result of new virtual workforce models necessitates a new approach, one that baselines...
In a world without boundaries, SASE is the security framework businesses need
Digital transformation and technology evolution has effectively removed the physical boundaries that previously constrained IT systems. As it has done this, the perimeter of organisations has been pushed closer to the edge, driven by cloud adoption, the Internet of...
It’s the end of passwords as we know it
Imagine it’s October 2050 and a school class is on a Cybersecurity Awareness Month field trip at the local museum. Suddenly, a student asks his teacher “what’s that?” staring at some strange combination of letters, symbols and numbers. “Oh, that’s a password,” the...
Hardware-based remote access solutions key to hybrid work security
As South Africa continues to grapple with the Covid-19 pandemic, the outbreak of the fourth wave and the discovery of the new omicron variant of the virus have likely scuppered the hopes of businesses seeing their employees return to the office any time soon. By Benji...
Better quality security requires synchronicity
There’s a lot of talk about cyber security - and for good reason. Barely a week passes without news of yet another high-profile breach, either in South Africa or abroad. By Antony Russell, chief technology officer of Telviva Perhaps the biggest risk for organisations...
Looking for trouble – cybersecurity for the digital age
Faced with relentless growth in cyberattacks, coupled with the complexity of today’s digital ecosystem, how should your business respond? Bas Burger, CEO: global at BT, shares his insights. There’s no going back. Over the past 18-months, businesses have got to grips...
Clearly defined roles and responsibilities critical for cloud security
When it comes to cloud versus on-premises infrastructure, security requirements remain the same, although the cloud requires additional controls because it is publicly available. By Simeon Tassev, MD and QSA at Galix The major difference is that on-prem has highly...
With ransomware, hindsight is 20/20
There are few things worse than discovering that your business has been compromised. Be it a phish, ransomware, hack or malicious attack, it's going to leave a long legacy of damage and complexity behind it. This is according to Martin Potgieter, co-founder and...
How hybrid work is pushing to end passwords
A new report from Cisco's Duo Security, the multi-factor authentication (MFA) and secure access solution, confirms that enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce. While the...
What security trends to expect in 2022
Cybersecurity trends for 2022 include nuclear ransomware 3.0, a major power station/utility provider will be crippled, disinformation powered by deep fakes, the rise of dark economy M&A and more. This is according to KnowBe4, in its 2022 cybersecurity predictions...
The high cost of phishing
Is your business safe right now? Are you sure there isn't malicious software lurking on your system, waiting for the next backup before it sweeps through your systems like wildfire? The realistic answer is no. Cybercrime is smart, innovative, and agile. Cybercriminals...