Connect with us

Featured

Digital transformation: 70% of projects will fail

According to IDC, 66% of CEOs will have digital transformation at the heart of their corporate strategy, but 70% of siloed digital transformation initiatives will fail by 2018.

This means that if organisations are to implement successful security strategies, they will have to ensure that these initiatives are at the core of the overall digital transformation of the company.

Research released at the recent 2016 IDC IT Security Roadshow showed that CIOs put cyber security and privacy technologies at the top of the list of technology priorities to support digital transformation. 85 percent of South African organisations surveyed also stated that they have plans to implement advanced security solutions by 2017.

Trending threats

Says Ido Naor, Senior Researcher in the Global Research and Analysis team at Kaspersky Lab: “Ransomware attacks are definitely on the increase and this is something that Kaspersky Lab anticipated two to three years ago already. Couple this with new ransomware variants that keep multiplying themselves and the fact that attacks are not being limited to specific industries or necessarily have mitigation and you have a major battle on your hands.”

“We are also seeing growth in mainly Android malware, particularly when large events take place such as the Olympics in Rio and the Euro Cup, during which users are more likely to download apps to keep abreast with the latest news about the events.”

When the attacker becomes the target

Targeted attacks by organised groups also continue to evolve. Continues Naor: “A year ago at the Kaspersky Security Analyst summit, we revealed a very sophisticated group, which uses targeted attacks against  governments, military, telecoms, aerospace and more, called Equation, operating since 2001. Subsequent to that, a group that calls itself The Shadow Brokers announced that they had stolen malware code from the Equation Group, which led to the release of the tools and script they use and vulnerabilities they had discovered and kept in order to use again as part of their attack.”

So how do you protect yourself?

Awareness is still the most traditional, yet effective method of protecting an organisation. Adds Naor: “Ensure that every employee in the company is aware of the existence of malware in general and educate them about the growing danger of ransomware and what some of the scenarios are to look out for. Basically, it is about teaching users or employees not to open suspicious emails or click on links they are not familiar with or which are not intended specifically for them. Also teach them not to use their corporate email when registering for services online. In addition, IT and security managers should apply security procedures that restricts malware from spreading from one machine to the other, by enforcing user group policies and segmented networks within the corporate LAN.”

While awareness certainly has an important role to play, organisations of all sizes also have to invest in security solutions to protect themselves. “You need to ensure that every entry and exit point for your organisation is secure. This includes protection at the endpoint and on the server side. It is also important to monitor encryption attacks through components such as a system watcher, which will enable you to revert back to the place where the station is not compromised.”

But what about the general consumer?

The proliferation of mobile devices on the African continent and an increase in Android malware means that individuals can also be at risk. Firstly, mobile users should make sure their device is updated at all times and they are using the latest version of their operating system on their phone. Secondly, they should be aware of what types of applications they are downloading and ensure they only download apps from credible sources such as their relevant app store and not from links that are being distributed via email or on social networks.

“I would recommend watching what you download. As mentioned earlier, big events often rely on apps to disseminate information to visitors, which creates an opportunity for attackers. So, if you are going to download an event-specific app or a trending game like Pokémon GO, make sure you have downloaded the right app from a reputable, valid source and that you are not downloading something that looks similar.”

Nowadays one cannot even rely on reviews to determine authenticity as these apps will often have good reviews, because the hackers know how to buy reviews or get reviews from compromised victims.

Where to from here and beyond?

“I believe that every cycle of an emerging attack trend or cycle of threats takes time to eliminate. We do find that in some regions, cyber security is taken more seriously. It also depends on the industry affected, as we find that the telecommunications, military and government sectors take these breaches far more seriously than for example retail. On a general note, we know that cyber threats are around and that they are going to get more severe, but there are security companies out there that are doing all they can to protect users. Collaboration will be key in fighting the scourge, though. So, for example, when Facebook faced a malware issue, we worked with them to create a plug-in to clean your machine if you were infected. Our best arsenal in the fight against cyber attacks will be collaboration, constant research and continuously retracing the attackers to make sure fewer people will fall victim to these attacks.” says Naor.

Featured

Eugene Kaspersky posts from 2050

In his imagined blog entry from the year 2050, the Kaspersky Lab founder imagines an era of digital immunity

In recent years, digital systems have moved up to a whole new level. No longer assistants making life easier for us mere mortals, they’ve become the basis of civilisation — the very framework keeping the world functioning properly in 2050.

This quantum leap forward has generated new requirements for the reliability and stability of artificial intelligence. Although some cyberthreats still haven’t become extinct since the romantic era around the turn of the century, they’re now dangerous only to outliers who for some reason reject modern standards of digital immunity.

The situation in many ways resembles the fight against human diseases. Thanks to the success of vaccines, the terrible epidemics that once devastated entire cities in the twentieth century are a thing of the past.

However, that’s where the resemblance ends. For humans, diseases like the plague or smallpox have been replaced by new, highly resistant “post-vaccination” diseases; but for the machines, things have turned out much better. This is largely because the initial designers of digital immunity made all the right preparations for it in advance. In doing so, what helped them in particular was borrowing the systemic approaches of living systems and humans.

One of the pillars of cyber-immunity today is digital intuition, the ability of AI systems to make the right decisions in conditions where the source data are clearly insufficient to make a rational choice.

But there’s no mysticism here: Digital intuition is merely the logical continuation of the idea of machine learning. When the number and complexity of related self-learning systems exceeds a certain threshold, the quality of decision-making rises to a whole new level — a level that’s completely elusive to rational understanding. An “intuitive solution” results fromthe superimposition of the experience of a huge number of machine-learning models, much like the result of the calculations of a quantum computer.

So, as you can see, it has been digital intuition, with its ability to instantly, correctly respond to unknown challenges that has helped build the digital security standards of this new era.  

Continue Reading

Featured

M-Net to film Deon Meyer novel

A television adaptation of Deon Meyer’s crime novel Trackers is to be co-produced by M-Net, Germany’s public broadcaster ZDF, and HBO subsidiary Cinemax, which will also distribute the drama series worldwide. 

Trackers is an unprecedented scripted television venture and MultiChoice and M-Net are proud to chart out new territory … allowing local and international talent to combine their world-class story-telling and production skills,” says MultiChoice CEO of General Entertainment, Yolisa Phahle.

HBO, Cinemax, and M-Net also launched a Producers Apprenticeship programme last year when the Cinemax series Warrior, coming to M-Net in July, was filmed in South Africa. Some other Cinemax originals screened on M-Net include Banshee, The Knick and Strike Back. 

“Cinemax is delighted to partner with M-Net and ZDF in bringing Deon Meyer’s unforgettable characters and storytelling—all so richly rooted in the people and spectacular geography of South Africa—to screens around the world,” says Len Amato, President, HBO Films, Miniseries, and Cinemax.    

Filming for Trackers has already started in  locations across South Africa and the co-production partners have been working together on all aspects of production 

Deon Meyer, whose award-winning crime novels have been translated into more than 20 languages, with millions of copies sold worldwide, serves as a supervising screenwriter and co-producer; British writer Robert Thorogood (Death in Paradise) is the showrunner. The team of South African writers on the project includes the Mitchell’s Plain playwright, screenwriter and director Amy Jephta (Die Ellen Pakkies Story) and local writer/directors Kelsey Egen and Jozua Malherbe. 

The cast for the six-part miniseries includes Ed Stoppard, Rolanda Marais, James Alexander and Thapelo Mokoena. 

Trackers will make its debut on M-Net 101 in October 2019 and will also be available on MultiChoice’s on-demand service, Showmax. The six-part drama series is produced by UK production company Three River Studios as well as South Africa’s Scene 23. 

Continue Reading

Trending

Copyright © 2019 World Wide Worx