Author: Francis Kaitano
In the past few years we have seen major developments in the availability and growth of high speed internet services in Zimbabwe. Such developments are a characteristic of the modern information and global economic age. At the same time such developments have led to the massive development and production of all kinds of software (Web Apps, Mobile Apps, etc.) to support and enable the organisations to carry out business over the internet.
Hack attacks are on the rise. And even if you’re not the immediate target, you could still end up a victim. It’s just a matter of time. This is generally true for big organisations. Targeted hacking is becoming a multibillion industry and the more profitable it becomes it means more skilled and talented hackers will join the bandwagon and hack for monetary gains.
Generally, data security is the process or procedures put in place to ensure that data is protected from corruption and unauthorised access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
Passwords are the primary way various systems, networks and applications verify that the user logging into the system is who he claims to be. This is why password security is enormously important for protection of the computer user, the workstation, and the network.
From the beginning hackers have been known for their skills of breaking into computers and networks. They applied different techniques and methodologies in order to break into corporate systems or personal computers.
In recent years we have seen several technological and software advancements. This has led to a new age made up of various asymmetric cyber attacks, fast paced and ever changing threat landscape
The early versions of internet based Malware popped up around the late 80s with the most common one being the Morris Worm. It caught many IT professional off guard back then.
Last week I listed a few examples of certifications (there are thousands of them out there). Over the years I learnt one thing that once you get one cert you keep accumulating more.
At one point early in our lives we were asked; “What do you intend to do when you grow up”. I remember so well that almost everyone in my Grade 2 class wanted to be a medical doctor. However, life being so dynamic we all ended up following different career lines.
In the past weeks, we have looked at the importance of information security in Zimbabwean organisations and the basics of InfoSec Governance. With such a background we can now diversify into one of the vital components of information security; building an effective enterprise security program. The information security program is a general framework made up […]
Corporate governance is a term that refers broadly to the rules, processes, or laws by which businesses are operated, regulated, and controlled. By mandate all Zimbabwean companies should practice good cooperate governance whether they are listed on the Zimbabwe Stock Exchange (ZSE) or not.
Network managers are being urged to run a series of checks on their routers and firewalls to ensure their users will still be able to connect to the internet in the wake of a major change to the internet’s domain name system this week.
On May 5, the world’s top domain authorities, led by the Internet Corporation for Assigned Names and Numbers (ICANN), the US Government and VeriSign, will complete the first phase of the roll-out of Domain Name System Security Extensions(DNSSEC) across the Internet’s 13 root servers.
organisations are still running on old/outdated legacy IT systems which are either not supported anymore by the vendors or the skills to maintain them are no longer available. This also means that security patches for these legacy systems are not available increasing the possibility of these systems being attacked