Services Infrastructure Services Information Security Information Storage





Information Security


Pitso Technologies provides the following solutions:


  • Information Security Access Control and Authentication
  • Network & Content Security
  • Data Security
  • Database Security
  • Archiving Products and Policy Development


Some important points on information security and our view towards how organizations should approach it:


New Security Trends in IT


Mention the words ‘online security’, and the thought that immediately comes to mind is anti-virus programmes and some form of malware protection.

But while these are mostly associated with consumers, there has never been a more pertinent time than the present to be aware of online threats to a business.

As with any technology, online security trends evolve as times goes by, with hacker, crackers and script writers becoming more cunning in circumventing whatever protection business employ on their systems.


“The first step to creating an appropriate strategy for dealing with Advanced Persistent Threats(APT) is to understand you’re a potential target. Whether it’s intellectual property, contact details or financial information your organization holds information that criminals could profit from” explains online security company Kaspersky Lab in its ‘Special Report on Mitigation Strategies for Advanced Threats’.







Security Update



Read More


Malware


One of the biggest threats that a company faces, and will face well into the future, is the evolution of malware.

Only 1% of malware is classified as advanced threats, which present companies with multi-faceted, continuous and targeted attacks. It is this small group that Kaspersky Lab says it is the most important to focus on.

70% of malware is classified as known threats, while 29% is unknown threats. These two groups can fairly easily be protected against, but it’s the unseen malware that is going to cause the most damage to a company.

 

“Designed to penetrate a network, lurk unseen and collect sensitive data, they can remain undetected for years’, Kaspersky Lab said. As an example, the APT known as ‘Darkhotel’ used the WiFi in luxury hotels to steal data from guests for seven years before being discovered


Vulnerability


No company wants to admit that they are vulnerable to attack, but the truth of the matter is tha no matter how secure an ecosystem has been made, someone out there is already trying to crack the files and steal data.

“In organizations where large numbers of employees are working across a number of devices, applications and platforms, it can be difficult to stay on top of all the risks and potential ‘attack vectors’ that exist for cybercriminals to exploit,” Kaspersky Lab explains

It becomes hugely important to raise the vulnerability awareness levels as the Bring Your Own Device (BYOD) trend shows no signs of letting up. Employees might connect to a secure network in the office, but employers can’t always control on which other networks those same devices are connecting through.

“To make matters worse it’s often harder especially with operating systems such as Apple iOS to tell if a device is infected. A mobile workforce is like a moving target; devices operating outside the safety of your perimeter are harder to police, making effective endpoint security a significant component of your security strategy.”


With that in mind, companies might do their best to secure the systems in the work place, but human error is one of the biggest helps to cybercriminals. Tapping into and explaining a company’s vulnerability awareness, employers can offer regular training sessions on trending security issues, encourage best-practice behaviour and have the right policies in place to minimise any fallout from a possible breach.

We at Pitso Technologies agree that human negligence can be one of the biggest loopholes in any system.


Surveys have shown us that developing/emerging nations are those which have a higher percentage of cybercrime victims. Naivety leads to vulnerability. We also like the Gartner’s ‘people-centric approach’ to security, which addresses the issue that people can be the worst pitfalls for security but if properly educated of risks become the analytics and ‘security sensor’ in the environment.


Endpoint Security


Since employees can make use of their own mobile phones to access company networks, and conduct business through cloud services, proper endpoint security is bound to make roaring return.

 

“This wide variety of endpoints, coupled with the number of methods cybercriminals can use to infect a network means that singular security measures simply aren’t enough”, Kaspersky Lab explains

Trend-wise, the security company predicts that robust mitigation measures need to be combined with threat intelligence, security policies and specialised technology that won’t just block recognised incoming threats.



Our Technology Partners










Company



Services


News


  • Blog
  • Facebook
  • Twitter
  • Newsletter

Support


  • Help Desk
  • Technical Support
  •  

Business Partners


  • Tri Solar Technology
  • IT Naledi
  • Polaris
  • Mono Technologies
  • Morolo IT


©2017 Pitso Technologies (Pty) Ltd. All Rights reserved