April 22, 2019 - by Mobolaji Moyosore
- in Uncategorized
The Nigerian cyber threat landscape is very interesting. It is almost a free for all environment where seasoned cyber criminals shamelessly advertise their services and capabilities to upcoming fraudsters. The army of bad guys, otherwise known as the “Gee Boys”, is growing at a rate that the good guys can only dream of, yet organizations
November 15, 2018 - by Mobolaji Moyosore
- in Business
Are you truly defending your enterprise or simply distracted? In today’s cyber threat landscape, an effective e-mail security capability is big deal. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 98% of all incidents and 93% of all breaches analyzed during its last reporting period involved phishing and pretexting (i.e. creation of a false
November 10, 2018 - by Mobolaji Moyosore
- in Business
A hacker by the moniker “Mr.OneJack” has added Nigeria’s National Assembly’s (NASS) website (nass[.]gov[.]ng) to his inventory of hacked sites. This does not look like a targeted attack given that there are similarities with several other websites already pwned by this threat actor. That said though, who knows whether any backend database was hacked as
August 26, 2018 - by Mobolaji Moyosore
- in Business
CarePartners didn’t seem to care about paying any ransom to a hacking group that stole their patients’ sensitive records 2 months ago, but now a malicious individual has decided to put the breached records up for sale on the underground market. On June 18, 2018, CarePartners – an Ontario-based home care service provider – publicly
July 23, 2018 - by Mobolaji Moyosore
- in Business
How do you identify disgruntled employees? At what point do you start monitoring their activities closely? Do your employees have expectation of privacy or does your policy make it clear that all employees’ activities may be monitored? The recent devastating insider attack at Tesla is a stark reminder of the fact that, as much as
May 19, 2018 - by Mobolaji Moyosore
- in Business
I am not one to beat a horse when it’s already dead but, at the same time, I find it hard to resist the temptation of using this possibly overstated security breach to reinforce the importance of putting your security house in order. Your business needs you and the reverse is true. Don’t wait to
January 06, 2018 - by Mobolaji Moyosore
- in Business
What do you call what’s worse than (a) BEAST? The biggest cyber security news for 2018 has surfaced and so much has been said about the Meltdown and Spectre vulnerabilities already. The most complete non-technical article I’ve read about this yet is available here Like the BEAST (SSL) vulnerability, these flaws have widespread applicability and
December 08, 2017 - by Mobolaji Moyosore
- in Business
Computer security is difficult (maybe even impossible), but imagine for a moment that we’ve achieved it. Strong cryptography where required; secure protocols are doing whatever needs to be done. The hardware is secure; the software is secure. Even the network is secure. It’s a miracle. Unfortunately, this isn’t enough. For this miraculous computer system to
December 07, 2017 - by Mobolaji Moyosore
- in Business
“Old age is like a plane flying through a storm. Once you’re aboard there’s nothing you can do.” – Golda Meir Let’s set the context to begin with: the “cloud” is your infrastructure and data in someone else’s data center. Most components of this infrastructure have IP addresses and so are hackable. Worse still, your data
December 05, 2017 - by Mobolaji Moyosore
- in Business
Mind the gap. If you’ve ever travelled on the London underground, you will be familiar with the line: “Please mind the gap between the train and the platform. Mind the gap”. This audible phrase reminds (or warns) passengers to be mindful of the spatial gap between the station platform and the train door. The first