Security strategy combats online attacks
Companies need to start deploying a multilayered security strategy that can deal with threats such as Web application attacks, point-of-sale intrusions and the misuse of network tools by staff without having to use multiple security strategies, says distributor of security and networking solutions Networks Unlimited.
“Companies can secure their operations by reducing opportunities for unauthorised access, increasing threat prevention and detection using advanced inspection systems for traffic, and by using tools to search for indicators of anomalies within the network. By implementing an effective incident response plan and introducing continuous monitoring, security is also increased,” explains MD Anton Jacobsz.
He notes that, even though companies are aware of the proliferation of cyber threats facing their enterprises and data, most are still unprepared to defend their software from an increasing volume and variety of malware and attacks.
“Enterprises need to re-evaluate their security strategies and aim to be proactive rather than reactive; in terms of malware, end point protection and data-loss prevention solutions can be used to monitor and control online and offline user activity,” he says.
Cyber Threats
Jacobsz says the most common of the Web application attacks are structured query language injection attacks and cross-site scripting vulnerabilities.
Point-of-sale intrusion is also another popular attack and is characterised by hackers gaining access to customer credit card numbers. “This can be detrimental to the company brand, as it only takes one intrusion to make the rest of your customers and clients weary of your security standards and, in turn, stop using your services,” he points out.
He notes that insider misuse refers to any type of unapproved or malicious use of organisational network resources by staff, usually to steal company intellectual property.
“Distributed denial-of-service attacks include any attacks aimed at denying access to company networks or systems,” Jacobsz notes, adding that cyber espionage involves network or system intrusion, which enables intruders to, for example, export company data.
Networks Unlimited is a value- added distributor, “offering the best and latest solutions within the converged-technology, data centre, networking, and security landscapes”, says Jacobsz.
Comments
The
functionality
you are trying to access is only available to subscribers.
If you are already a subscriber, you can Login Here.
If you are not a subscriber, you can subscribe now, by selecting one of the below options.
For more information or assistance, please contact us at subscriptions@creamermedia.co.za.
Option 1 (equivalent of R125 a month):
Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format
Option 2 (equivalent of R375 a month):
All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors
including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.
Already a subscriber?
Forgotten your password?
Receive weekly copy of Creamer Media's Engineering News & Mining Weekly magazine (print copy for those in South Africa and e-magazine for those outside of South Africa)
➕
Recieve daily email newsletters
➕
Access to full search results
➕
Access archive of magazine back copies
➕
Access to Projects in Progress
➕
Access to ONE Research Report of your choice in PDF format
RESEARCH CHANNEL AFRICA
R4500 (equivalent of R375 a month)
SUBSCRIBEAll benefits from Option 1
➕
Access to Creamer Media's Research Channel Africa for ALL Research Reports on various industrial and mining sectors, in PDF format, including on:
Electricity
➕
Water
➕
Energy Transition
➕
Hydrogen
➕
Roads, Rail and Ports
➕
Coal
➕
Gold
➕
Platinum
➕
Battery Metals
➕
etc.
Receive all benefits from Option 1 or Option 2 delivered to numerous people at your company
➕
Multiple User names and Passwords for simultaneous log-ins
➕
Intranet integration access to all in your organisation