Posted on Leave a comment

Advanced Security Requirements for Remote Work

Transitioning most or all of your organization’s employees to remote work creates significant security challenges. Your business continuity plan should take these challenges into account and include solutions to address these new risks. And what you can learn…

DOWNLOAD WHITE PAPER

What’s inside:

  • Understand the latest in Fortinet features for secure remote work
  • Learn key components of a secure remote Access Point (AP) solution
  • Prepare for ongoing telework requirements using the right infrastructure

In case you have any questions regarding this topic, do not hesitate to reach out to us. We would be more than happy to answer your questions.

Posted on Leave a comment

Five Mistakes To Avoid When Securing a Hybrid Network

Today’s hybrid networks make centralized visibility and control difficult to achieve.

Consolidation and integration of networking and security are the best strategies for addressing such overly complex environments. But selecting the right solution can be daunting, and there are several critical mistakes to avoid.

DOWNLOAD OUR EBOOK

In this eBook, you will learn the five most common mistakes to avoid when securing a hybrid network.

In case you have any questions regarding this topic, do not hesitate to reach out to us. We would be more than happy to answer your questions.

Posted on Leave a comment

Secure office networking for SMBs

All organizations in today’s world must be able to adapt to changing business conditions with little advance notice.

This is not so easy. Many organizations have already seen firsthand that traditional firewalls simply cannot scale across multiple applications required for secure telework

DOWNLOAD OUR SOLUTION BRIEF

Download the Complete Small and Midsize Business Protection solution brief and discover seven considerations that should guide your evaluation when upgrading to next-generation network security.

In case you have any questions regarding this topic, do not hesitate to reach out to us. We would be more than happy to answer your questions.

Posted on Leave a comment

Secure and Simplify SD-WAN with Fabric Management Center

SD-WAN solutions that lack consolidated security and networking require adding an assortment of tools to secure and manage the solution. Instead of SD-WAN making things easier, complexity is increased and security gaps are introduced.

DOWNLOAD OUR EBOOK

Fortinet simplifies and secures SD-WAN with a number of capabilities that:

  • Lower total cost of ownership
  • Improve efficiency
  • Contain risks

In case you have any questions regarding this topic, do not hesitate to reach out to us. We would be more than happy to answer your questions.

Posted on Leave a comment

Ransomware is Here to Stay

Ransomware is rapidly growing, partly due to the expansion of Ransomware-as-a-Service. These easily obtainable tools make it easy and cost-effective for nearly any bad actor to launch a successful ransomware attack.

DOWNLOAD OUR WHITEPAPER

Find out what you’re facing in the white paper:

  • Trends uncovered by FortiGuard Labs analysis of ransomware activity
  • Top distribution methods of ransomware
  • Types of ransomware attacks

We hope you will find it useful!

In case you have any questions regarding this topic, do not hesitate to reach out to us. We would be more than happy to answer your questions.

Posted on Leave a comment

POPIA enforceable as of 1 July 2021

POPIA Condition 7 – what you should know

POPIA is going to be enforceable as of 1 July 2021, and while the majority of businesses have already embarked on their data protection journey, having a set deadline for compliance puts the pressure on, says Pieter Nel, Regional Head for SADC at Sophos.

Nel makes particular reference to the POPI Act’s Condition 7 on security safeguards, which requires businesses to secure all of the personal information that they have by implementing appropriate and reasonable security measures.

He clarifies: “The POPI Act sets forth eight conditions for the lawful processing of personal information. These conditions address how organizations demonstrate accountability for the privacy of individuals in South Africa. The Act regulates how this information is collected, stored, processed and shared. It also includes security measures that responsible parties must comply with to ensure the integrity and confidentiality of personal information.”

In brief, businesses have an obligation to safeguard the personal information that they have from being destroyed unlawfully, accessed unlawfully, being lost or damaged. They need to put reasonable technical and organizational measures in place to protect this personal information. They also need to identify and priorities new risks.

Nel highlights three major areas for POPI Act Condition 7 compliance: perimeter defense, data protection and access control to data, and discusses the types of measures that can be deployed.

Businesses can deploy firewalls to monitor and block malicious, exploitive inbound and outbound traffic and consider solutions such as intrusion prevention systems, advanced persistent threat, anti-virus, sandboxing, Web and e-mail protection. It’s also key to implement a solution that can identify and highlight shadow IT, the use of IT-related hardware or software without the knowledge of IT or security department. Identifying such usage helps to prevent exposure of sensitive data through non-approved company services (Dropbox, etc) and can save organizations from potential risk. Deployed solutions must be able to share threat, system health and security information in real-time.

Endpoints require protection against data-stealing malware and ransomware. Data on mobile devices must be secured and encrypted. Data should be encrypted and secured wherever it goes, including in transit. Businesses should consider a solution that automatically detects shared storage and database resources in the public cloud, assessing security posture and configurations to reduce the risk of a data breach.

Businesses should consider user-aware control over applications, Web surfing and other network resources and the ability to identify users who utilize high network traffic. Compromised machines should be isolated, preventing lateral movement or data exfiltration. It’s also key to manage access privileges for user, group and cloud service roles able to access public cloud accounts and resources storing data. Identity access management (IAM) policy updates must be done on a regular basis. Protect privileged and administrator accounts with two-factor authentication.

“Most South African businesses had already implemented some of the measures suggested above to secure personal information long before POPIA or GDPR were enacted, so may just need to review their data protection policies and technologies and possibly implement some additional ones where required. Access rights and security measures also need regular review,” says Nel.

Source: https://www.itweb.co.za/content/dgp45va6rNG7X9l8