Memcached, the latest DDoS attack

Lately, Distributed Denial of Service (DDoS) attacks have grown in popularity and effectiveness, undermining internet security. March kicked off with the most powerful DDoS attack in history: 1.35 terabytes of traffic hit GitHub, the collaborative developer platform. However, just a few days later, a new threat thwarted by Arbor Networks smashed that record, with a 1.7Tbps attack. Unlike the DDoS …

How can I protect my company’s VPN?

Telecommuting is the future of work. Or at least that’s how some today see it, such as Forbes Magazine. However, remote work means less-monitored work spaces which presents some cybersecurity issues. That’s why many companies opt for using a VPN which creates a more secure work environment, no matter where employees work from; but this can be a double-edged sword. What is …

What happens if I violate GDPR?

Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared? The likelihood that your company is unprepared is high, as three out of five companies state that they are not ready to implement the changes that the new data protection regulation requires. According to a recent study by Forrester, a large …

The Dangers of Plug-ins

Plug-ins are add-ons developed for all types of solutions and applications. The most well-known provide new features for browsers, messenger services and tools such as WordPress. All of them, without exception, can cause significant security breaches at your company. Plug-ins as an attack target The widespread use of certain plug-ins is the main reason that some hackers have focused their attention …

Afraid of insider attacks? This is how you can defend your company

There is no doubt that insider attacks at a company can be catastrophic. According to Haystax, they can cost a company on up to $500,000 to $1,000,000. What’s more, 90% of companies surveyed in the latest Crowd Research report are considered to be vulnerable to this type of security problems. In fact, 53% of companies claim they have suffered an …

Your Company’s IT Resources are a Mine for Hackers

Blockchain technology was invented in early 2009 to support bitcoin, a new digital currency with a clear objective: make transactions without the need for traditional intermediaries. Invented by the enigmatic Satoshi Nakamoto, bitcoin kicked off the cryptocurrency boom. But as society’s interest in cryptocurrencies has grown, so has criminal interest, creating headaches for companies’ security departments. The rise of cryptojacking …

Keys for an Effective Incident Response Plan

Despite the fact that a cyberattack can have devastating effects, the majority of companies are not prepared to deal with such problems. And even though a company may have a good prevention plan and a solid security team, breaches do occur. That’s why a good incident response plan needs to be in place. What is a SIRP? A Security Incident …

Panda Security Africa and BDO form Strategic Partnership to Mitigate Cyber-Risk

Leading global cyber security firm Panda Security Africa and audit, advisory and tax firm, BDO South Africa, have formed a strategic cyber alliance to enable BDO to offer a managed security service to their clients, using Panda’s next generation EDR solution. Predictions for 2018 indicate that cybercriminal activity shows no signs of slowing down, and organizations need to constantly review …

BYOD: when protecting the perimeter is not enough

It’s a well-known fact that millennials and generation Z are digital natives and are basically always connected to their gadgets.  This trend has consequences extending beyond the consumer market, with an effect on the corporate world as this young cohort enters the workforce.  One example is more people using their own laptops and mobile phones at the office and for …

Satori and the Latest Botnets to Wreak Havoc on the IoT

The number of connected devices is increasing at a staggering pace. Statista estimates that by 2025, that number will reach up to 75.4 billion globally, assuring their presence in practically every sector. This rapid increase is creating security concerns, especially in relation to recent botnets like Satori, which infect devices with cryptocurrency mining software. In this post, we take a …