Search Business Insights

Business Directory

Explore Our Directory Of Certified Business Partners

09 Oct
2018

What Businesses Need to Know about Cybersecurity


cybersecurity

One of the most important elements of cybersecurity is constant monitoring of the nature of security risks

The approach is to focus resources on crucial system components and to protect the biggest known threats without leaving components defenceless against less dangerous risks.

Within an organisation, the people, technology, and processes must function altogether to create an effective defence against cyber-attacks. Let’s look at how this collaboration can work:

  • People: Data controllers must understand and comply with basic data security principles, for example, passwords, attachments in e-mails and storage of data.
  • Technology: Technology in the organisation should be updated and protected, for example, computers and routers, networks and the cloud, firewalls, malware protection, antivirus software, and email security solutions.
  • Processes: Data controllers must have a framework for dealing with attempted and successful cyber-attacks. This framework must include the manner in which the Company identifies cyber-attacks, protects systems, detects and responds to threats and recovers from successful attacks.
  • Staff: Staff should be aware of cyber risks and be trained on a regular basis to be diligent in identifying possible cyber breaches.

What are the elements of cybersecurity?

Ensuring cybersecurity in the current business environment requires a more proactive and adaptive approach to the coordination of efforts throughout an information system, which includes Information security, Application security, Network security, Operational security, Disaster recovery, and End-user education.

What are the types of cybersecurity threats?

The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. It is essential, however, in order to protect information and other assets from cyber threats, which could take many forms:

  • Ransomware is a type of malicious software that involves an attacker locking the victim’s computer system files and demanding a payment to decrypt and unlock them.
  • Social engineering is an attack that relies on human interaction to trick users into breaking security procedures and revealing sensitive information. Examples of social engineering include clicking on a link or downloading malware etc.;
  • Malware is a type of software used to gain access or cause damage to a computer, such as computer viruses, worms, and spyware etc. ;
  • Phishing “419 scams” is the practice of sending fraudulent e-mails that resemble e-mails from reputable sources. The aim is to steal sensitive data such as login information and credit card numbers etc.

Implementing guidelines to enhance cybersecurity

Implementing guidelines to identify and assess risks in the business environment is crucial to enhance cybersecurity.

  • Always install and update good anti-malware and antivirus programs.
  • Never open an e-mail if it appears in your spam folder and never click on links that seem suspicious and unexpected.
  • Ignore unexpected warnings for security software. They may appear via e-mail or may pop up in a new browser window. This scareware is designed to infect and access your data.
  • “ Social hacking” occurs when somebody impersonates someone else in an attempt to get sensitive information or even access your computer by installing software or clicking on a malicious link.
  • Never give out personal information to strangers who call on the phone.

Conclusion

Identifying cybersecurity risks and monitoring these risks are the first steps to cybersecurity. Implementing guidelines and an assessment framework for cybersecurity programs seek to enable critical information security infrastructure.

SERR Synergy assists businesses in compiling and implementing an Information Security Management policy whereby the physical information and cybersecurity risks of organisations are identified and managed to maintain the confidentiality and legitimate availability of data.

About the Author: Retha van Zyl completed her BCom Hons (Economics and Risk Management) studies at the North West University. She joined our team in January 2016 and currently holds the title ‘Information Compliance Advisor’. She specialises in POPI and PAIA compliance, which includes compiling and submitting PAIA manuals to the Human Rights Commission. She also compiles and implements ISMS to identify risks associated with information security in each department within an organisation.

 

Business Essentials is Africa’s premium networking and business directory.

Read more from our Press Room:

____

Fundamental Principles

____

Recent building Fires in Johannesburg a Wake-Up Call For Business and Government

____

The Use of Thermal Paper



Related Service Providers:

SERR Synergy


Related Articles:


Why Incentive Travel is Still the Ultimate Reward

Travel has been seen as the ultimate incentive since the 1970’s and 1980’s when it really started to gain traction as a motivating reward The main reason why incentive travel is so successful is because it taps into our human


IBA Group Wins GSA Global Sourcing Award 2018

  And the winner is… On October 2, the Global Sourcing Association (GSA) in cooperation with Business Process Enabling South Africa (BPESA) announced the winners of the 2018 GSA Global Sourcing Awards. IBA Group was selected the winner in the


[adrotate group="2"]

All You Need To Know About Chemical Stress

By Body Stress Release 0 comment(s)

How To Keep Up, Digitally

By Ayvel Media 0 comment(s)


In Property, We Trust

By Leapfrog Property Group 0 comment(s)

Usizo Business Sharing Forum

By Macsteel 0 comment(s)

[adrotate group="3"]