2015’s top 5 Cyber Security risks in South Africa:

  1. Blast ware to Destroy Systems, Erase Data and Cover Hacker Tracks
  2. Hackers Look to Evade Law Enforcement, Frame the Innocent
  3. Internet of Things Becomes Internet of Threats
  4. Denial of Revenue/Data Breaches Continue and Expand
  5. Denial of Revenue/Data Breaches Continue and Expand

How users, enabled hackers to obtain these details more easily by providing known companies with our data?

Protect against online fraud Online fraud takes on many guises that can impact everyone, including small businesses and their employees. It is helpful to maintain consistent and predictable online messaging when communicating with your customers to prevent others from impersonating your company. Be sure to never request personal information or account details through email, social networking or other online messages. Let your customers know you will never request this kind of information through such channels and instruct them to contact you directly should they have any concerns.

  1. Protect against phishing Phishing is the technique used by online criminals to trick people into thinking they are dealing with a trusted website or other entity.

businesses face this threat from two directions — phishers may be impersonating them to take advantage of unsuspecting customers, and phishers may be trying to steal their employees’ online credentials. Attackers often take advantage of current events and certain types of the year, such as: • Natural disasters (Hurricane Katrina, Indonesian tsunami) SF-1 FCC SMALL BIZ CYBER PLANNING GUIDE F-2 • Epidemics and health scares (H1N1) • Economic concerns • Major political elections • Holidays

How they can be avoided or mitigated?

  • Test web-facing servers often and thoroughly. How often is often? Hackers have probably discovered 10 new ways to exploit your server as you read this sentence. Initiate automated scans and manually scan your web servers at least monthly. Use multi-layered scanning – don’t use the same scan utility over and over. Scan from inside and outside your network. You never know where a hacker may be sitting.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s