Home » Security » Page 31

Security

3 Freshest & Latest Trends for Cloud Security in 2021

Sourced from InfoWorld. With cloud security continuing to be a hot topic in 2021, Fortinet and Cybersecurity Insiders decided to ask cybersecurity professionals around the world and across all industries for their latest insight. The brand new 2021 Cloud Security Report reveals how more than 500 cybersecurity professionals —from technical executives to managers and IT security practitioners — are responding to security threats in the cloud, how their organisations are using the cloud, and the best practices they are prioritising. Let’s take a look at some of the key findings. 1. A Diverse Digital Landscape – The Role of Cloud Security First, and perhaps not surprisingly, organisations continue to rapidly adopt the cloud to meet key business objectives. And that trend doesn’t...

Commissioners urge partners to support ongoing efforts to ensure security in schools

The Commissioners of Education in the 19 Northern States have urged development partners to support the ongoing efforts to ensure security in schools. The commissioners made the call in a communique issued in Kaduna on Wednesday, at the end of a meeting on Students Exchange Programme (SEP), held in Kano. The communique was signed by the Chairman, Shehu Muhammad, who is also the Commissioner of Education, Kaduna State. The meeting was organised to discuss pressing issues affecting education in the region. The commissioners suggested that community members and education ‘stakeholders’ be part of the security architecture to ensuring security in schools in the region and the country. They appealed to the federal, state governments, development partners, parents, non-governmental organisations...

IT Teams Facing Cyber Threats in 2020 – 5 Vital Insights

Image sourced from CIO. “Around the world, 2020 was an unprecedented year for IT teams,” said Chester Wisniewski, principal research scientist, Sophos. IT professionals played a vital role in helping organizations to keep going despite the restrictions and limitations necessitated by COVID-19. Among other things, they enabled education institutions to move learning online, retailers to switch to online transactions, healthcare organizations to deliver digital services and care under incredibly tough circumstances, and ensured public entities could continue to provide essential services. Much of this will have been done at high speed, with limited equipment and resources available and while facing a rising tide of cyberattacks against the network, endpoints and employees. To say things were...

4 Simple Steps Your Company Can Take to Protect ERP Systems from Cyber-Threats

Image sourced from Software ONE. Cybercrime taps into the vulnerability of business systems and can pose a real threat to a robust supply chain. A sophisticated ransomware attack recently targeted the world’s largest meat processor. Following the business system breach, operations in the US and Australia were disrupted, resulting in a knock-on effect. The meat processor had no option but to shut down nine beef plants in the United States and several plants in Australia. Several truck drivers who specialize in hauling livestock also had no choice but to drive hundreds of miles to pick up cattle from an alternative supplier. For the end-consumer, the long-term impact of the cyber-attack could mean inflated meat prices. Unfortunately, this is not the only instance of a cyber-attack on critica...

Senator Gyang: Nigerian government hasn’t captured Plateau in housing units resettlement

Deputy Chairman Senate Committee on Defence and Senator representing Plateau North, Istifanus Gyang, said Federal Government is yet to consider Plateau State on the 500 housing units constructing for for destroyed communities in North East due to Insecurity. He appealed to President Muhammadu Buhari in the spirit of fairness and Justice to come to the aid of Plateau communities, particularly destroyed communities in Barkin-Ladi, Riyom, Bassa and other villages in Plateau North. Sen. Gyang disclosed this on Monday during an interaction with Journalists at his constituency office, tagged, “The People’s Parliament” lamented over the the deteriorating security situation in the country. “I have being crying out for Federal Government to include Plateau State in the 500 housing units being build...

Cybersecurity Is More than A Tech Problem – It’s a Business Problem Too

Image sourced from Finance Times. A concerning number of South African companies are not prepared for the inevitability of a cyberattack despite the significant financial and reputational risks, according to Ryan Mer, MD, eftsure Africa, a Know Your Payee (KYP) platform provider. “Too few senior managers view cybersecurity as a business problem and not just a technology problem,” he says. “The reality is cybersecurity is very much a business consideration. CEOs and CFOs will eventually face critical questions such as: How much money do we spend on cybersecurity? Do we change key processes? How do we create awareness and change company culture? Do we put security ahead of operational functionality? What is the role of internal processes and staff on data security and integrity?.” Mer adds t...

6 Urgent Steps Companies Need to Take to Ensure POPIA Compliance

Sourced from Europa EU. The eleventh hour is upon businesses who are not POPIA (Protection of Personal Information Act) compliant. The effective date of 1 July is upon us. Your business should have already started its compliance journey, as it will at least help lessen the risk of cybersecurity breaches. Securing your data will help your business be in good standing with local and international partners. This will also enhance the reputation of your business and exempt you from fines and non-compliance. Here are six steps your business can take before 01 July to be POPIA compliant: 1. Encrypt Everything One of the major requirements under POPIA is to ensure that you apply Generally Accepted Information Security Protocols. While these requirements are not the same for all organisations, som...

Ondo governor: Why Amotekun will transform into state police

Governor Oluwarotimi Akeredolu of Ondo State on Saturday said that the State Security Network codenamed Amotekun Corps would eventually transform into a State Police overtime. Akeredolu, who insisted that every federating unit in the country should have its own police for effective security, noted that there was no serious attempt to redesign the nation’s security architecture to respond to the demands of a nascent country at the time of independence. Speaking at the 2021 Democracy Day lecture held in Akure, the state capital, the governor also said that he does not believe in secession. At the event held at the International Event Centre (DOME), Akeredolu said the local government could not be absolutely autonomous and that the Federal Government should have no control, whatsoever, over h...

Femi Falana charges Nigerian government to dialogue with agitators, secessionists

Nigeria’s foremost human rights lawyer, Mr Femi Falana (SAN) yesterday challenged the federal government to dialogue with various groups agitating for secession from the federation. Falana justified this demand on the premise that it “is on the roundtable the grievances can be sorted out” in the interest of peace, security and development He made this at the 25th anti-corruption situation room, which the Human and Environmental Development Agenda (HEDA) organised in Lagos yesterday. Speaking on the subject, “Assessing The Fight Against Corruption,” said it was the promise to fight corruption that made Nigerians vote for President Muhammadu Buhari. The human right lawyer said it was the corruption in the system that culminated in agitating for secession, noting that it “is better for the fe...

Kaspersky Discovers Various Malicious Apps Disguising as Bestselling Game Minecraft

Sourced from Stuff. Recognised as the world’s top-selling game of all time, Minecraft attracts the attention of enthusiastic players around the world but also draws the interest of fraudsters. Earlier, Kaspersky researchers discovered more than 20 applications advertised on app stores offering additional Minecraft features. Though these malicious apps were deleted from official stores, Kaspersky experts have found newly developed ones, which exploit the game to further fraudster’s objectives. Malware on Google Play Store Kaspersky researchers analysed various apps, including those which are available for download on the Google Play store and claimed to be modpacks (user-created packages with additional gameplay elements) for the game. As a result, the company’s experts found various malici...

Edo deputy governor: Godfatherism bane of Nigeria’s democracy

The Deputy Governor of Edo State, Comrade Philip Shaibu, has blamed the advent of godfatherism in Nigeria’s politics as the bane of democracy in the country. This is even as he called for the removal of a bicameral legislature to reduce cost of running governance. Shaibu stated this on Saturday at the Government House in Benin, the state capital, while addressing hundreds of youths who were protesting alleged misrule in the country. The protesters under the aegis of Coalition of Civil Society Organizations, Students’ Unions and other concerned Nigerians, brandished placards of various inscriptions, as they joined others across the country to seek for good governance and sustainable democracy. The protest which commenced at 10 am, lasted for more than two hours and disrupted free flow of hu...

5 Crucial Things You Need to Do When You Receive A Phishing Email

Image sourced from Kaspersky. You may not even notice when you receive one, most suspicious emails are automatically sorted to spam by your email service – though, a few may slip through the cracks, and one or two may even be authentic enough for you to click through their contents. The most important thing to remember about phishing emails is that unless you open any attachments or click on any links, you will not be affected by malware. Phishing emails are based on social engineering and work off bait, hence the name, and unless the bait is taken you can’t be affected by the cybercriminals holding the rod, fingers twitching at the reel. If you’re not familiar with these kinds of emails or begin to feel nervous or panicked when you receive one – this list is for you. Here are 6 crucial th...