Wednesday, January 22, 2025
No menu items!

The Redstor guide to effective, robust corporate security

Must Read
The Redstor guide to effective, robust corporate security
The Redstor guide to effective, robust corporate security

There is a heightened sense of cybersecurity in the corporate world. Companies are now more aware than ever before of the level of risk they are exposed to and the real danger that sophisticated cyber threats pose.

Cyber-criminals are using sophisticated tech-driven methods to extort, hack and otherwise ‘hijack’ poorly defended systems for their own gain.


To help businesses better protect themselves and their resources, and effectively deal with the impact of Europe’s General Data Protection Regulation (GDPR) and South Africa’s Protection of Personal Information (POPI) legislation, global data management SaaS specialist Redstor has published a comprehensive guide.

How to protect your IT environment against the evolving threat of cyber-crime was introduced in February 2018.

The company has drawn on its plus-20 years of experience in supporting business processes, most notably security, to draft and release the document.

And businesses can use all the support and guidance they can get says Danie Marais, Director of Product Management at Redstor.

“Cyber-crimes and incidents have become headline-worthy news and with the names of companies effected including the likes of Facebook and Uber it’s no little wonder why. Despite an updated mandate to ensure that all incidents are reported quickly, some organisations are failing to do so, and incidents make news years afterward,” says Marais.

He says the year kicked off in fine form as it was announced that widely used microchips manufactured by Intel and other firms included an exploitable vulnerability that could lead to large-scale data breaches.

“The Spectre and Meltdown vulnerabilities gave hackers the ability to access cached data stored in an operating system kernel. While most implementations limit access to this cache, a malicious code of ransomware strain could be designed to assist in data theft,” Marais adds.

As Redstor explains this vulnerability was discovered by the Google Project Zero team and manufacturers at Intel and others worked to patch systems against the vulnerability very quickly following it making headlines.

The company said malware and ransomware dominated news headlines throughout 2016 and 2017.

However, crypt-currency has also emerged as a challenge.

“The growth in the use of crypto-currencies at the same time lead to the widescale use of crypt-currency as a payment method for exploitation or ransom by cyber-criminals,” Marais continues.

“In February, crypto-jacking made headlines as a strain of malware designed to infect websites and mine crypto-currency from them was found on a number of sites including some UK government sites and the Information Commissioner’s Office (ICO) website,” he adds.

Edited by Daniëlle Kruger

Follow Daniëlle Kruger on Twitter

Follow IT News Africa on Twitter

- Advertisement -

How can AI Technology Drive Retail Risk Management in SA

The retail industry in South Africa is currently grappling with significant challenges, particularly as consumers experience economic strain following...
Latest News
- Advertisement -

More Articles Like This

- Advertisement -