Home » Fortinet Security

Fortinet Security

Why Ransomware is the Greatest Threat to Your Organisation

Ransomware is getting nastier and more expensive all the time and it has affected almost every industry and geography. No one is immune from the threat. In a global ransomware survey conducted by Fortinet, 67% of organizations report suffering a ransomware attack. Even worse, almost half said they had been targeted more than once, and nearly one in six said they had been attacked three or more times. Renee Tarun, Deputy CISO/ Vice President Information Security, Fortinet Inc. The US Treasury’s Financial Crimes Enforcement Network (FinCEN) reported that organizations paid out almost $600 million in ransomware in the first half of 2021, which puts the US on track to surpass the combined payouts of the previous decade in a single year. Last year’s attacks on the suppl...

FirstNet Technology Services Broadens its Security Offering with EDR Solution from Fortinet

Image by Darwin Laganzon, Pixabay. FirstNet Technology Services, a First Technology Group company, has broadened its security portfolio offering to include endpoint detection and response (EDR). As a long-time Fortinet partner, FortiEDR was the natural choice. This is according to Dave Campbell, Product Manager: Cloud Services at FirstNet, who explains, “FirstNet holds an Advanced Level partner status with Fortinet. Our cloud and security services are underpinned by a range of Fortinet products, with the use of solutions including FortiGate, FortiAnalyzer, FortiManager, FortiEDR, and FortiToken, which makes the FirstNet and Fortinet partnership a compelling offer for our customers.” “This experience has made us one of the top Fortinet partners in South Africa with a wealth of technical and...

iOCO Brings Fortinet’s Secure SD-WAN to Local Financial Services Institution

iOCO, the ICT services business of the JSE-listed EOH Group, has been chosen to assist a large financial services company in the implementation of its software-defined wide-area networking (SD-WAN) rollout. This has allowed the firm to take a bold move forward in its stated aim of building a network incorporating the ‘modernised branch of the future’.  Brett van Rensburg, Sales Director for iOCO’s Compute division, says: “Having recently undertaken a rigorous year-long request for proposal (RFP) process to choose our SD-WAN providers, we were duly impressed with the Fortinet Secure SD-WAN offering. “This new project with the financial services company has now allowed us to test the scope and breadth of the Fortinet solution, with truly impressive results. The top benefits that Fortine...

3 Things to Consider When Implementing an Effective Zero Trust Access Strategy

The most secure network is one that has no connections. Of course, that idea is not only impractical, it defeats the purpose of a network. The reality is that no network is an island, and as businesses become more digital, networks inevitably become more complicated and dispersed. Today’s networks now have many “edges,” so it’s much harder than it used to be to create a single defensible boundary. In the face of these changes, the traditional network perimeter is dissolving, and it’s far more difficult to tell who and what can be trusted. To respond to increasing threats, best practices now stipulate a “trust no one, trust nothing” attitude toward network access. Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices, and all web appli...

iOCO Offers Africa-Focused SD-WAN Solution to IT Landscape

Brett van Rensburg,  Sales Director for iOCO’s Compute Division After a year-long due diligence process, EOH, a JSE-listed technology services firm, through its IT services company, iOCO, has chosen to extend its partnership with Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, in order to offer its software-defined wide-area networking (SD-WAN) solution to the southern African market.  As explained by Fortinet, an SD-WAN solution connects users to any application wherever it resides, from the data centre to the cloud. SD-WAN intelligently determines which path best meets the ideal performance needs for a specific application. It then routes the traffic through to the best WAN path, whereas traditional WAN architectures only have the ability t...

7 Techniques Cybercriminals Could Use to Steal Your Private Data

Cyber threats do not rest and they continue to evolve as bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise. The most important thing is to know how exactly cybercriminals may attempt to gain access to your data. Here are seven techniques they might try: Password Spraying: A form of brute force attack that targets multiple accounts in which adversaries try multiple guesses of the password on a single account that often leads to account lockout. With password spraying, the adversary only tries a few of the most common passwords against multiple user accounts, trying to identify that one person who is using a default or easy-to-guess password and thus avoiding the account lockout scenario. Key logging attack: By insta...