Our Blog

Email Blocking: Between Effective Cyber Defense and Common Distraction

By Mobolaji Moyosore | Nov 15, 2018

Are you truly defending your enterprise or simply distracted? In today’s cyber threat landscape, an effective e-mail security capability is big deal. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 98% of all incidents and 93% of all breaches analyzed during its last reporting period involved phishing and pretexting (i.e. creation of a false

View Full Post
Read More

NASS Website Hacked. Who Cares?

By Mobolaji Moyosore | Nov 10, 2018

A hacker by the moniker “Mr.OneJack” has added Nigeria’s National Assembly’s (NASS) website (nass[.]gov[.]ng) to his inventory of hacked sites. This does not look like a targeted attack given that there are similarities with several other websites already pwned by this threat actor. That said though, who knows whether any backend database was hacked as

View Full Post
Read More

CarePartners Will Now be Made to Pay. Somehow…

By Mobolaji Moyosore | Aug 26, 2018

CarePartners didn’t seem to care about paying any ransom to a hacking group that stole their patients’ sensitive records 2 months ago, but now a malicious individual has decided to put the breached records up for sale on the underground market. On June 18, 2018, CarePartners – an Ontario-based home care service provider – publicly

View Full Post
Read More

Tesla Lesson: When Does a Disgruntled Employee Become a Threat?

By Mobolaji Moyosore | Jul 23, 2018

How do you identify disgruntled employees? At what point do you start monitoring their activities closely? Do your employees have expectation of privacy or does your policy make it clear that all employees’ activities may be monitored? The recent devastating insider attack at Tesla is a stark reminder of the fact that, as much as

View Full Post
Read More

Equifax: The Breach That Keeps on Hurting

By Mobolaji Moyosore | May 19, 2018

I am not one to beat a horse when it’s already dead but, at the same time, I find it hard to resist the temptation of using this possibly overstated security breach to reinforce the importance of putting your security house in order. Your business needs you and the reverse is true. Don’t wait to

View Full Post
Read More

Meltdown and Spectre Flaws: Time to Activate Panic Mode?

By Mobolaji Moyosore | Jan 6, 2018

What do you call what’s worse than (a) BEAST? The biggest cyber security news for 2018 has surfaced and so much has been said about the Meltdown and Spectre vulnerabilities already. The most complete non-technical article I’ve read about this yet is available here Like the BEAST (SSL) vulnerability, these flaws have widespread applicability and

View Full Post
Read More

Cyber (In)Security: How Fine is the Line Between Apathy and FUD?

By Mobolaji Moyosore | Dec 8, 2017

Computer security is difficult (maybe even impossible), but imagine for a moment that we’ve achieved it. Strong cryptography where required; secure protocols are doing whatever needs to be done. The hardware is secure; the software is secure. Even the network is secure. It’s a miracle. Unfortunately, this isn’t enough. For this miraculous computer system to

View Full Post
Read More

To Cloud or Not to Cloud?

By Mobolaji Moyosore | Dec 7, 2017

“Old age is like a plane flying through a storm. Once you’re aboard there’s nothing you can do.” – Golda Meir Let’s set the context to begin with: the “cloud” is your infrastructure and data in someone else’s data center. Most components of this infrastructure have IP addresses and so are hackable. Worse still, your data

View Full Post
Read More

The Cyber Security Talent Gap – Myth or Reality?

By Mobolaji Moyosore | Dec 5, 2017

Mind the gap. If you’ve ever travelled on the London underground, you will be familiar with the line: “Please mind the gap between the train and the platform. Mind the gap”. This audible phrase reminds (or warns) passengers to be mindful of the spatial gap between the station platform and the train door. The first

View Full Post
Read More
×

Make an appointment and we’ll contact you.