Intelligence Hub

All the latest Company News, Intelligence and insight

Company Updates

Understanding cyber risk and the C-Suite

The threat landscape for businesses has evolved significantly in recent years, with cyberattacks becoming more sophisticated and frequent. As a result, cybersecurity has become a top priority for organisations of all sizes, and the C-suite, including CEOs, CFOs, CIOs, and CISOs, plays a critical role in managing and mitigating cyber risk. The State of Email Security,

Read More »
What have you been doing John?
Intelligence

What have you been doing John?

am constantly seeing and hearing more talk about the risk posed by insiders when it comes to business risk. The talk of insider risk and the threat to the business, threats to compliance and security has been amplified in recent weeks, yet very few businesses have any form of Insider Risk Management program in place. 

Read More »
Company Updates

Serious consequences for companies that invoice via email

South Africa’s largest law firm, ENSafrica, has recently been ordered to pay a cybercrime victim R5.5 million after a syndicate successfully hacked into a client’s email during a property transaction. The hackers altered the bank account number in a PDF invoice sent by the law firm, resulting in the client losing a substantial amount of

Read More »
Helping financial services mitigate insider threats
Company Updates

Helping financial services mitigate insider threats

Insider threats are a problem for every industry, but financial services are by far the prime target for data theft. No other industry is tasked with handling and securing more sensitive data. For large financial institutions with large numbers of employees, it is critical to have visibility into employee activities that raise red flags signaling

Read More »
John Mc Loughlin
Intelligence

Mitigating the risk of zero-day attacks against Microsoft 365

Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time. Zero-day attacks – those attacks that take advantage of a vulnerability in software or firmware, and found by cybercriminals before a vendor can issue a fix – are one of the cybercriminal’s greatest advantages. Often providing

Read More »
Managing-the-insider-risk
Company Updates

Managing the insider risk is extremely complicated

The risk from malicious insiders has long been a priority for CISOs and has now become a top priority for other executives and board members. Employees require access to sensitive information, but heavy-handed approaches using complicated and static rules can frustrate users. This hampers productivity and leads users to search for workarounds that can also

Read More »
You have a ‘super malicious insider’
Company Updates

You have a ‘super malicious insider’

There’s a super malicious insider who is technically proficient and often acutely aware of an organisation’s technical limitations in proactively detecting insider threats. This is according to Dtex System’s 2022 Insider Risk Report that is based on real investigations and data collected by the Dtex Insider Intelligence and Investigations (i3) team throughout 2021.  The super

Read More »
payment fraud
Intelligence

Make sure you pay the CEO

Over the last month the J2 Software team have noticed an increase in an evolved method in change of bank details or payment fraud. While this might sound like old news, this now more directly involves the CEO. Traditional payment fraud has been rife for some time where the cyber criminal impersonates the CEO, or

Read More »
Securing your estate’s technology
Company Updates

Securing your estate’s technology

Cybersecurity is one of those topics that has been in the media and in almost every print and online publication, even in verticals that have nothing to do with cybersecurity, for years. Today it’s one of those topics that we gloss over or perhaps don’t even see unless the headline is catchy or mentions a

Read More »
How smart are smart homes really
Company Updates

How smart are smart homes really

Connected consumer and business products have begun flooding the market, but security remains an afterthought. Cybercriminals are always on the prowl to access smart devices like wireless security cameras, smart TVs, baby cameras, smart speakers, smartphones or tablets. The plethora of connected gadgets introduced to homes over the past decade has opened new doors for

Read More »

Request Consultant