Categories
Uncategorized

FIVE SKILLS ISVM WILL TEACH YOU NEXT MONTH

Add Your Heading Text Here

Share it:

ISVM or Information Systems Vulnerability Management is a hands-on training for system administrators, security engineers, CTO’s , CISO and individuals interested in managing systems vulnerability (or vulnerability related to systems) .

Since its inception , more than 250 technical consultants have learnt modern ways of resolving and managing systems vulnerabilities.

However this year, potential applicants for ISVM are likely to benefit from modern ways of managing systems vulnerability. Our trainers are eagerly ready to reveal new secrets of black hats to you and how to resolve them.

Below are five skills  ISVM will teach you if only you make the effort to register!

  • How to Identify Hash Type:

It is not quite easy to identify hash codes if you don’t know how to.  DES, Domain Cached Credentials, MD5(Unix), RAdmin v2.x, and MySQL5 are examples of hash codes.

ISVM will teach applicants how to identify hash codes in a simpler way. Knowing the type of hash codes you are dealing with helps you to know which technique to use when cracking hashed password.

  •    Patch Roll-out:

Patch roll-out is implemented when researchers discover vulnerabilities. However when patch-roll out is not done in the right way, it affects interrupts meaningful work.

ISVM will teach you specific procedures and policies to follow.

  •    Responding to new threats:

How do you respond to new threats or zero-day attacks? If you don’t know, hurry up and book for a seat. ISVM will teach you proactive approach to zero – day attacks in addition to how you can choose to implement SANS or NIST policies with regards to incident response.

  •      Developing A Backout Plan:

At ISVM you will understand why it is necessary to have a backout plan. Truth be told, almost every organisation has a backout plan. Yet when there is an emergency, IT officers struggle to bring up or ensure Infrastructure is up and working .

ISVM trainers will teach and recommend tried and tested ways of developing a good backout plan.

  •   Practical Hands-on with Metasploit:

This is one particular skill every security engineer must try harder to learn. Metasploit is the new trend in town. A security engineer who knows how to use metasploit effectively is likely to become a valuable security engineer.

We hope to see you soon!

#ISA_informs

#ISA_ltd 

Categories
Uncategorized

It’s Time to Up Your Game: Infosec Ops!!!

Add Your Heading Text Here

Share it:

The threats won’t reduce; security researchers and attackers won’t rest.

Learn the real skills that empower you to leverage on information security tools. Your information infrastructure is as secured as the skill of the attacker, so up your game.

Join us, contact Information Security Architects Ltd business@isa.com.gh | +233245640029 | +233208141250 Weekend Bootcamps Available | 12Hours of quality content! #SecurityStateOfMind #UpYourGame #ISVM #isaghana #Infosec #KnowledgeTransfer #2018 

Categories
Uncategorized

Why You Should Choose ISA As Your Cybersecurity Provider!

Add Your Heading Text Here

Share it:

The cybersecurity landscape is becoming a crowded place because of cybercriminals employing complex methods to penetrate into networks. On the other hand, many cybersecurity providers/firms are being established to provide solutions to modern day cyber-attacks. Despite all these cybersecurity firms claiming to be competent, cyber-attacks keep increasing.

As a growing enterprise in the corporate world, how do you ensure that your cybersecurity provider is incompetent or it is capable of delivering a world-class penetration testing? Most companies prefer to have a cybersecurity provider with good technical support, top-notch performance and other good attributes.

The following reveals five solid reasons why you should choose Information Security Architects as your cybersecurity partner:

  • Top Technical Support:

Few cybersecurity providers place 100% emphasis on technical support for their clients; and ISA is part of these few ones. You can not avoid technical issues. Technical issues occur almost everyday. Without good technical support team, your business won’t operate the way you want it.

ISA provides top-notch technical support in specific areas such as database encryption failure, complex networking problem and so on.

  •     Detailed Researching:

When choosing your cybersecurity partner, it is advisable to opt for providers with experienced researchers. Without good researchers, your cybersecurity provider or partner can’t educate you on current vulnerabilities. When you know how your enemy operates,  you are not troubled at all.

At ISA, our cybersecurity researchers often dives into malware affecting mobile and web, research on the latest techniques attackers use to penetrate network and so on. Without all these information, your organization is at risk.

Do you prefer to have cybersecurity provider with fancy technologies rather than researchers having the desire to do just a little bit more?

  •        Practical Training:

Finally, many cybersecurity providers offer  training deemed as ”practical”. Yet one registers and later finds out that the entire training is theoretical.

At ISA, we offer practical training such as ISVM to Cybersecurity Practitioners, Chief Information Officers, CTO’s, System Administrators, or Individuals eager to get their hands dirty in order to learn how manage vulnerabilities on systems.

Knowing how hackers penetrate into your network and learning the skills to fix and manage vulnerabilities is crucial for every organisation.

Hence, I urge every organisation interested in securing data from intruders as well as protecting their infrastructure or network from damage to choose ISA as partners or providers.

#ISA_informs

#ISA_ltd 

Categories
Uncategorized

Porn on the move: In 2017, over 25% of users hit by mobile malware faced porn-themed attacks

Add Your Heading Text Here

Share it:

Wednesday, 31st January 2018

        In 2017, 25.4% of mobile users who encountered malware – over 1.2 million people – were attacked by malicious programs that used adult content to lure them into installing malware on their devices.

This is one of the findings of Kaspersky Lab’s recent overview, ‘Cyberthreats facing users of adult websites and apps’.

Sex sells, as they say in advertising. However, in cyberspace it serves not only as a method for securing sales, but also as a tool for malicious activity. This became obvious when Kaspersky Lab experts took a look at how cybercriminals are using adult content in their activities.

It turns out that the most active use of porn topics is in the mobile threat landscape. During the course of the research, Kaspersky Lab specialists identified 23 families of malware that use porn content to hide their real functionality.

The research showed that when downloading an unknown porn application, users are at greatest risk of being infected with so-called clickers. Upon infection, this malware starts to click through ad-links or try to subscribe the user to a WAP-subscription in order to drain their pre-paid mobile credit.

Banking Trojans disguised as porn video players are the second most widespread type of porn-powered malware. This is followed by rooting malware and ransomware.

The latter often comes in the form of legitimate applications for known porn websites. In many cases, porn ransomware utilises scareware tactics: it locks the device screen and shows a message stating that illegal content (usually child porn) has been detected on the device, and the device has therefore been locked.

In order to unlock the device, the victim has to pay a ransom. This message usually comes with screenshots from actual child porn videos.

Although we can’t say that porn-themed mobile applications are technically very different to those that do not use porn in their activities, there are a few specifics when it comes to attacks with porn-powered malicious applications.

A victim who has been compromised with an adult content-enabled malicious program might think twice before reporting the incident, simply because the very fact that they were trying to find porn content is viewed critically.

Therefore, from the attacker’s perspective, such a person is a much more convenient victim. This is one of the reasons why we see so many attacks with porn malware.

          The other one is much simpler: people are consuming ever more content via mobile. This includes adult content as well,” said Roman Unuchek, security expert at Kaspersky Lab.

To prevent any malware or cyber fraud-related troubles when it comes to adult content we strongly advise users to follow these recommendations:

  1. Use only trusted web sites when it comes to adult content. Cybercriminals often set up fake porn sites for the single purpose of infecting victims with malware.

  2. Do not install Android applications from unknown sources, even if they promise you access to the content you were looking for. Instead, use official applications from official sources, like Google Play.

  3. Avoid purchasing hacked accounts to porn websites. This is illegal and such accounts may be blocked by the time you purchase it.

  4. Use reliable internet security solution capable of protecting all your devices from any kind of cyberthreats.

Learn more about threats that users of adult content websites and applications face in the full overview here.

About Kaspersky Lab

Kaspersky Lab is a global cybersecurity company celebrating operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe.

The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them.

Learn more at www.kaspersky.co.za.

For further information please contact:

Princess Tsambo| Orange Ink|

Cell: +27 76 544 6703 Tel: +27 11 465 4075; +27 11 465 4030

princess@orangeink.co.za

Categories
Uncategorized

Safely Migrating to Cloud-Based Email: New Kaspersky Security for Microsoft Office 365 Enhances Protection in Exchange Online

Add Your Heading Text Here

Share it:

Thursday, 1st February 2018:   

         Small and medium-sized businesses are still on a cloud adoption journey and for the majority of them, embracing a cloud-based email service is the first checkpoint along the way.

Indeed, it tops the most used cloud-based business applications worldwide, according to the latest report from Kaspersky Lab. Now, a new Security-as-a-Service offering from Kaspersky Lab is bringing Next Generation detection technologies, powered by machine learning and real-time cloud-based threat intelligence to cloud-based email systems, providing enhanced protection for Exchange Online in Microsoft Office 365.

                                    Email is still in the crosshairs of cybercriminals

Sending and receiving emails is a part of every business’s daily routine, so it is no wonder that cybercriminals are still committed to finding new ways of exploiting this for their own malicious purposes. 

According to the recent quarterly spam report from Kaspersky Lab, there has been a steady growth and increasing levels of deviousness used in phishing and spam campaigns.

For SMBs in particular, this means that IT administrators are having to spend more of their time deleting irrelevant emails and recovering mistakenly-deleted messages, instead of working on business-critical IT tasks. 

Moreover, irrelevant emails are not only a challenge for IT resource efficiency and employee productivity. They become a real threat to a business when it comes to the phishing of staff credentials or the spreading of malware in email attachments. In 28% of targeted attacks that happened this year, the use of phishing/social engineering was a major contributing factor. 

Essential protection for email: on-premises and in the cloud: 

  To address these security challenges and help small and medium-sized businesses protect their on-premises email systems, Kaspersky Lab offers protection for mail servers and mail gateways as targeted solutions.

This year, we are expanding our SMB portfolio by adding a new product — Kaspersky Security for Microsoft Office 365 — to extend protection to the cloud-based mail service Exchange Online inside the Microsoft Office 365 suite.

Working in conjunction with Microsoft’s built-in protection, the combined security solution provides users of Microsoft Office 365 with enhanced protection from ransomware, malicious attachments, spam, phishing (including Business E-mail Compromise – BEC) and unknown threats. 

he range of Next Generation security technologies enabled in the product includes a neural network-based anti-phishing engine, machine learning-based detection, sandboxing, attachment filtering and Kaspersky Lab’s global threat intelligence network — all powered by Kaspersky Lab’s HuMachine which combines human expertise with big data threat intelligence and machine learning to defend against every type of threat a business may face. 

Native integration in the cloud and ease of management: 

     Like Microsoft O­ffice 365, Kaspersky Lab’s product is hosted in the cloud, which offers convenient and flexible cloud-based management for both email and security. 

  Kaspersky Security for Microsoft Office 365 provides small and medium-sized businesses with many benefits, such as easy configuration and native integration with Exchange Online, a dashboard showing statistics on threats and detections at-a-glance, and the ability to backup and recover deleted emails. 

Along with Kaspersky Endpoint Security Cloud, the new product is managed from a single cloud-based administration console. MSPs/MSSPs and outsourced IT administrators will benefit from its multi-tenancy, which allows protection for different organizations to be simply managed. 

It can also support multiple accounts for different administrators, providing increased flexibility and ease of use.  

Vladimir Zapolyansky, Head of SMB Business at Kaspersky Lab, comments: “With millions of emails sent on a daily basis, it might take just one – with a malicious attachment such as ransomware or a phishing link — to damage or even destroy a business. 

”With the release of this new product, we are excited to provide our customers who are migrating to the cloud-based Microsoft Exchange in Office 365 with Next Generation security technologies to protect their email communications – whether they’re hosted on-premises or in the cloud.”  

Kaspersky Security for Microsoft Office 365 is available globally now and can be purchased online.

To learn more about the product and start a full-functionality three-day free trial please visit cloud.kaspersky.com. Customers can also purchase Kaspersky Security for Microsoft Office 365 from Kaspersky Lab partners from 8th February 2018. 

About Kaspersky Lab 

     Kaspersky Lab is a global cybersecurity company celebrating operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe.

The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. 

Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.co.za.   

For further information please contact:

Princess Tsambo| Orange Ink|

Cell: +27 76 544 6703 Tel: +27 11 465 4075; +27 11 465 4030

princess@orangeink.co.za