Am I part of the problem?

Everyone is at risk from a supply chain attack, but are we all aware of our responsibilities? The supply chain is changing, of that there can be no doubt. Just a few short years ago, it was a linear, mostly one-dimensional structure that was relatively easy to police and manage. However, this is absolutely no longer the case, with many different actors now involved – ranging from start-ups and solo entrepreneurs to multinational corporations. Take Amazon as an example.

Importance of Collaborative Security

Collaborative security should not only be used to benefit the Internet as every organisation contains assets that are critical to the processes and procedures of running the organisations. This includes: Individuals, devices, information, the media and provided services.

Complete the form below to sign up to the Cyber Security Bulletin

Security Bulletin
First
Last

Protecting African businesses against cybercrimes

Many businesses in Africa have become more subjected to cybercrimes in recent years due to not having the necessary protection in place. Cybersecurity was previously considered an expensive operational cost by many organisations in Africa, however the increasing rise in security breaches on the continent has made more of them aware of the consequences of not having the necessary security measures in place and highlighted the value of their benefits.

Managed Endpoint Detection & Response (MDR)

WithSecure’s™ dedicated Detection and Response team deals with potential cyber threats to your organisation in minutes. Their Countercept MDR solution acts as an extension to your security team, sharing WithSecure’s™ threat-hunting expertise whilst helping your team learn and grow, together with supporting continuous improvement of your security posture.

Shipment Scams and the Theft of Credit Card info

Phishing is an age-old technique used to deceive victims into providing their private and confidential information so that they and/or the information that they provided may be exploited and used in fraudulent activity. It has also become the most prominent cyber crime worldwide.

Threats in the Wild

South Africa
Dis-Chem exposed to large cyber attack
Dis-Chem had over 3.6m records exposed in a recent cyber attack that it became one of the latest South African organisations to fall victim to.

Shoprite compromised with Ransomware
Africa’s largest supermarket chain has fallen victim to a cybercrime. The cyber gang threatens to leak customer information online unless Shoprite pays up.

Cyril Ramaphosa’s data leak
Cyril Ramaphosa has been a victim of a recent data breach and the Cybersecurity firms warn that the vulnerabilities discovered by the cyberhackers could lead to sensitive military and intelligence data being intercepted.

International
Crypto currency and Cyber theft
Hackers have stolen another $100 Million in Crypto currency from a Blockchain Transfer Protocol with a total of $1 Billion having been lost date.

Microsoft’s Data breach
A Lapsus$ breach at Microsoft took place on the 22nd March this year with Microsoft confirming that Lapsus$ had breached its defences. Just two days before the breach, the cyberhackers had apparently posted a snapshot, showing two major projects that have been compromised, being Bing and Cortana.

Plex’s breach
The large streaming services company known as “Plex” has apparently been a victim of cybercrime and users needed to change their passwords immediately.

This bulletin is intended to increase the security awareness in organisations by providing useful information to help enhance security and safety when using computing devices and the Internet.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team