How to secure your network from a Ryuk ransomware attack

Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk ransomware hit its network on September 27, according to an article on the Health

IT Security 4 min read Read

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe?

Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior through machine learning …

IT Security 2 min read Read

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced …

IT Security 3 min read Read

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?

 In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be …

IT Security 3 min read Read

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …

IT Security 2 min read Read

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as …

IT Security 2 min read Read

Are you listening to your logs? Part 1: Slow server response

Loading…

Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website.

Are you listening to your logs? is …

IT Security 2 min read Read

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach.

 The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such …

IT Security 4 min read Read

Breach notification requirements of POPIA: The importance of SIEM

A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification of security compromises—unauthorized exposures of personal data—to the authorities and the data subjects in concern. Notification of data breaches is mandated by several data protection …

IT Security 3 min read Read