Cybersecurity

Summit Cybersecurity Project Frontline Report 2020 launch

The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported …

Summit Cybersecurity Project Frontline Report 2020 launch Read More »

I.T Security Controls

I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in place to address security risks. A security control can also be defined as an action, a mechanism that we apply to our I.T. infrastructure to either to protect our systems …

I.T Security Controls Read More »

Are you an effective Cybersecurity/ I.T Manager?

As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T Manager) to help fast track the process. These professionals when hired most of the time forget the primary role of the business. It’s imperative that security professionals remember that they …

Are you an effective Cybersecurity/ I.T Manager? Read More »

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information, …

Healthcare Cybersecurity: Are your medical records safe? Read More »

Understanding DoS and DDoS Attacks

Recently, A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between December 2013 and January 2014 was sentenced to 27 months in prison. Austin Thompson, a.k.a. “DerpTroll,” pledged guilty back in November 2018 after he admitted to being a part of DerpTrolling, a …

Understanding DoS and DDoS Attacks Read More »

Easy Cyber hygiene practices to keep you Safer

Every day, employees hear the same things from their IT staff about cybersecurity and safety. Though they may pushy and monotonous, there are very important reasons and rationale behind these practices and advice. Keeping safe and secure while connected isn’t just about how your system is set up – it is also very much about …

Easy Cyber hygiene practices to keep you Safer Read More »

Cybersecurity Incident Response Planning

As the number of cyber breaches occurring worldwide increases, a number of companies have invested a lot of money in system hardening, user awareness, intrusion detection systems and other technologies to prevent data breaches. BUT is that enough? Even with all the various systems and controls in place, a company can still suffer a significant …

Cybersecurity Incident Response Planning Read More »

Why Insurance players MUST attend the Cybersec conference!

Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise and relies on trust. The industry has also undergone a tremendous change in the way the business is conducted from risk assessment and underwriting to onboarding, service delivery, and on-going …

Why Insurance players MUST attend the Cybersec conference! Read More »

Countering Cyber Attacks

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Countering Cyber Attacks Read More »

10 reasons for a career in cybersecurity and forensics – Part 2

9th: Endless opportunities I got my first job at a time I was pursuing an accountancy qualification. My job performance indicators were a number of manual forms scanned. Once upon a time, banks kept manual banking system. All client information was kept in a manual file folder, including deposits and withdrawals.  It was not easy …

10 reasons for a career in cybersecurity and forensics – Part 2 Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.