Defense In-Depth with Cognitive Security

On Tuesday, July 25th 2017 between 9am and 3pm, IBM security experts and ActivEdge Technologies held an exposition on: Defense In-Depth with Cognitive Security. Below are Interesting Highlights on this Informative Event: The event witnessed over 55 attendees from more than 14  institutions in Nigeria. Central Bank of Nigeria, Keystone Bank, Electronic Payplus Ltd, Stanbic IBTC,… Read More Defense In-Depth with Cognitive Security

How Secured are Nigerian Banks and Firms against Ransomware Attacks

Several Ukrainian banks have been affected by what appears to be a coordinated ransomware cyber attacks targeting firms around the world. According to a report by Reuters, the virus first emerged on Tuesday 27th June, 2017 in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited a local… Read More How Secured are Nigerian Banks and Firms against Ransomware Attacks

Use cognitive Security to achieve Agility in Cyber Defense

A few years ago defense in-depth approach became quite prominent in cyber defense methodology, where security controls was applied in a layered manner to achieve some forms of resilience. This remains in practice today and not likely to change anytime soon. In more recent times Cyber Resilient started gaining recognition among security professionals, this approach… Read More Use cognitive Security to achieve Agility in Cyber Defense

Is Your Investment on Branding Protected?

Organizations are increasingly investing millions of naira on building their brands and creating awareness. However, with recent happenings globally, the security of organizational data, network and identity has become a necessity. To combat such threats, Agari works with hosted or on-premise email infrastructures including Gmail, Microsoft Office 365 and industry leading secure email gateways to… Read More Is Your Investment on Branding Protected?

How to Protect Your Company’s Data and Network

Regardless of the nature of business, it has become consistently impossible for organizations to exist in isolation. You need people to run organizations and companies, as such it has become increasingly important to protect your data and network from careless and sometimes malicious employees. Here are our recommendations in three steps. Reduce Exposure First, limit… Read More How to Protect Your Company’s Data and Network

Nigeria Central Switch Records N2.19B Loss to Fraud

Last week, we started a discussion on Ransomware attack and Phishing, to further iterate our point, Nigeria central switch records N2.19B loss to fraud. This was stated on Friday, June 4th Guardian newspaper. According to the report, Governor Godwin Emefiele said the review of the Cybercrime Act became imperative more than before as a result… Read More Nigeria Central Switch Records N2.19B Loss to Fraud

5 Quick Steps to prevent a WannaCry Ransomeware Attack

On Friday 12 May 2017, the world was alarmed to discover that cybercrime had achieved a new record. A widespread series of ransomware attacks hit organizations in more than 100 countries within a span of 48 hours, believed to be the biggest attack of its kind ever recorded. As of today, the attack is known… Read More 5 Quick Steps to prevent a WannaCry Ransomeware Attack

Handling Insider Threats

Regardless of how most organizations shy away from this discussion and reckoning with the fact that insider threat exists, insider threat poses a significant risk to the growth and stability of organizations. Whether a careless or malicious activity by an authorized personnel having privilege access to critical information of an organization or an accidental access… Read More Handling Insider Threats

Pfizer And IBM Launch Ambitious ‘Internet Of Things’ For Parkinson’s Research

Pfizer is betting big on the Internet of Things, or IoT, in medicine–that is, the connectivity of physical objects like medical devices to collect and exchange data–to boost Parkinson’s R&D and ultimately, to better inform care for patients. To make this nebulous idea a reality, the pharmaceutical company is partnering with computer titan IBM IBM… Read More Pfizer And IBM Launch Ambitious ‘Internet Of Things’ For Parkinson’s Research

How widespread login practices have left most industries and consumers vulnerable to phishing attacks

The PhishLabs 2017 Phishing Trends and Intelligence Report reveals a profound shift in the overall cyber threat landscape. During this on-demand webinar, Senior Security Threat Researcher, Crane Hassold, goes into more detail about how widespread login practices have left most industries and consumers vulnerable to phishing attacks, causing a fundamental shift in modern cybercrime. He explains why this… Read More How widespread login practices have left most industries and consumers vulnerable to phishing attacks