Connect with us

Featured

Hacktivism at all-time high

Published

on

Check Point’s 2015 security report has revealed that among other issues, known and and unknown malware is on the increase, mobile devices are a company’s biggest weak-point and preventing data loss is a concern for most enterprises.

Check Point Software Technologies has issued its 2015 Security Report, the company’s third annual report revealing the major security threats that impacted organisations across the world.

The 2015 Security Report provides insight into the degree of infiltration and sophistication of new threats in the enterprise. Mobility, virtualisation and other technologies have changed the way we do business. While organisations have adopted these tools to enhance productivity, they often forget about the security implications that arise when they lack the proper security implementations. The Check Point 2015 Security Report reveals the prevalence and growth of threats on enterprise networks, through information obtained over the course of 2014. This report is based on collaborative research and in-depth analysis of over 1,300 organisations (including 39 South African organisations), over 300,000 hours of monitored network traffic, from more than 16,000 threat prevention gateways and 1 million smartphones.

Key findings include:

Known and Unknown Malware Increased Exponentially

Malware rose at alarming rates in 2014. This year’s report revealed that 106 unknown malware hit an organisation every hour: 48 times more than the 2.2 downloads per hour reported in 2013. Unknown malware will continue to threaten the enterprise in the future. Even worse than unknown malware is zero-day malware, which is effectively built from scratch to exploit software vulnerabilities, of which vendors aren’t yet even aware. Cybercriminals are also continuing to use bots to amplify and accelerate the spread of malware. 83 percent of organisations studied were infected with bots in 2014, allowing constant communication and data sharing between these bots and their command and control servers.

Mobile Devices are a Company’s Biggest Vulnerability

Mobile devices are the weak links in the security chain, providing easier direct access to more valuable organisational assets than any other intrusion point. Check Point research found that for an organisation with more than 2,000 devices on its network, there’s a 50 percent chance that there are at least 6 infected or targeted mobile devices on their network. 72 percent of IT providers agreed that their top mobile security challenge is securing corporate information, and 67 percent said their second biggest challenge is managing personal devices storing both corporate and personal data. Corporate data is at risk, and being made aware of these risks is critical to taking the proper steps to secure mobile devices.

Using Risky Applications Comes at a High Price

Corporations frequently rely on applications to help their business be more organised and streamlined. However, these applications become vulnerable points of entry for businesses. Some applications, such as file sharing, are obviously risky. The rise of ‘shadow IT’, applications that aren’t sponsored or supported by the central IT organisation has led to even riskier business. Research revealed that 96 percent of organisations studied used at least one high-risk application in 2014, a 10-point increase from the previous year. Check Point research also unveiled that 12.7 high-risk application events happen every hour. That creates many opportunities for cybercriminals to access the corporate network – that is risky business.

Data Loss is Top of Mind

Cybercriminals are not the only threat to the integrity and security of corporate data. Just as quickly as a hacker could penetrate a network, in-network actions can also easily result in data loss. Check Point found that 81 percent of the organisations analysed suffered a data loss incident, up 41 percent from 2013. Data can unknowingly leak out of any organisation for a variety of reasons, most of those tied to current and past employee actions. While most security strategies focus on protecting data from hackers coming in, it is equally important to protect data from the inside out.

“When it comes to cyber security, we can no longer segment threats on a country-by-country basis. The same threats that cripple multinational organisations in America can take down an SME in South Africa – malware does not discriminate when it comes to organisation size or territory. The Internet has made the world a very small place, and new malware can infect millions of devices all over the world in minutes,” said Doros Hadjizenonos, Country Manager of Check Point South Africa.

“Today’s cybercriminals are sophisticated and ruthless: they prey on the weaknesses in a network, approaching any security layer as an open invitation to try to hack it. In order to protect themselves against attacks, security professionals and organisations alike must understand the nature of the latest exploits and how their networks are potentially impacted. Only by arming themselves with a combination of knowledge and strong security solutions can organisations truly protect themselves against these evolving threats. By making security a critical asset to your business, you can turn security into an enabler, and in doing so, you’re able to unlock innovation and foster an environment for high performance and productivity.”

Featured

Now download a bank account

Absa has introduced an end-to-end account opening for new customers, through the Absa Banking App, which can be downloaded from the Android and Apple app stores. This follows the launch of the world first ChatBanking on WhatsApp service.

Published

on

This “download your account” feature enables new customers to Absa, to open a Cheque account, order their card and start transacting on the Absa Banking App, all within minutes, from anywhere and at any time, by downloading it from the App stores.

“Overall, this new capability is not only expected to enhance the customer’s digital experience, but we expect to leverage this in our branches, bringing digital experiences to the branch environment and making it easier for our customers to join and bank with us regardless of where they may be,” says Aupa Monyatsi, Managing Executive for Virtual Channels at Absa Retail & Business Banking.

“With this innovation comes the need to ensure that the security of our customers is at the heart of our digital experience, this is why the digital onboarding experience for this feature includes a high-quality facial matching check with the Department of Home Affairs to verify the customer’s identity, ensuring that we have the most up to date information of our clients. Security is supremely important for us.”

The new version of the Absa Banking App is now available in the Apple and Android App stores, and anyone with a South African ID can become an Absa customer, by following these simple steps:

  1. Download the Absa App
  2. Choose the account you would like to open
  3. Tell us who you are
  4. To keep you safe, we will verify your cell phone number
  5. Take a selfie, and we will do facial matching with the Department of Home Affairs to confirm you are who you say you are
  6. Tell us where you live
  7. Let us know what you do for a living and your income
  8. Click Apply.

 

Continue Reading

Featured

How we use phones to avoid human contact

A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.

Published

on

Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances. 

Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?

The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.

In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.

Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.

Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”

To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:

·         I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?

With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.

·         Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?

Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.

·         I’ve lost my phone! How will I keep myself entertained now?

Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.

 

Continue Reading

Trending

Copyright © 2018 World Wide Worx