Articles

Discover High-Impact Attack Paths with Darktrace

Discover High-Impact Attack Paths with Darktrace

In the world of cybersecurity, it's essential to understand the potential pathways that attackers might use to compromise an organisation's sensitive assets. That's where attack path modelling comes in - it creates a comprehensive map of all possible routes that lead...

read more
The key to effective Attack Surface Management

The key to effective Attack Surface Management

Effective Attack Surface Management (ASM) is essential for understanding and mitigating cyber risks to your organisation. It can be broken down into four key parts: discovery, assessment and prioritisation, risk prevention, and integration. Discovery is the foundation...

read more
The problem with passwords

The problem with passwords

This year, as cyber incidents continued to be one the rise, one of the key topics of consideration was the role of strong authentication in protecting organisations against the risk of cyber threats. And despite the widespread use of passwords for authentication, they...

read more
Curbing Shadow IT in your organisation

Curbing Shadow IT in your organisation

“Shadow IT refers to (the use of) IT devices, software and services outside the ownership (approval) or control of IT organisations.” – Gartner The above definition gives the idea that Shadow IT can only be carried out by malicious actors when it is actually more...

read more
Understanding the mechanics of a data breach

Understanding the mechanics of a data breach

Definition: A data breach is a cyber-attack in which sensitive or confidential data has been accessed or disclosed to an unauthorised individual or software system. Data breaches normally come in the form of exposed customer credit card numbers, corporate data, source...

read more
The key to effective SaaS Asset Management

The key to effective SaaS Asset Management

Increasing levels of remote work and the accompanying migration to the cloud has seen a renewed emphasis on data protection, proactive threat monitoring and IAM (Identity & Access Management). The last 2 years have solidly established the fact that the cloud is...

read more
How to better identify a social engineering scam

How to better identify a social engineering scam

Social engineering, the practice of manipulating a victim into believing they are communicating with a trusted individual or platform, so they give up confidential information, remains one of the biggest threats to an organisations cybersecurity. With an estimated...

read more
2022 cybersecurity strategies for startups

2022 cybersecurity strategies for startups

Few things evolve as rapidly as the state of cybersecurity and what should be prioritised to protect an organisation from malicious actors. In recent times ransomware has dominated the headlines with businesses, both large and small, often being on the receiving end...

read more
Eliminating the man in the middle

Eliminating the man in the middle

The time is 12:53pm. You just got to your favourite coffee place to seal the deal with an exciting prospective client. Suddenly you remember that there’s a document on your company server that you need to quickly go through before your prospective client arrives. You...

read more
Only The Agile Will Survive

Only The Agile Will Survive

A lot has been said about the importance of a business being agile. Business agility is crucial as the ability to adapt to your environment in real time may result in a competitive advantage. This is not only true in regards to a business being able to adapt the...

read more
4 Cybersecurity Lessons Learnt In 2021

4 Cybersecurity Lessons Learnt In 2021

What a year it’s been and there’s certainly a lot to learn as we complete year 2 of the dreaded “new normal”. March 2020 marked the start of a drive for enterprise reinvention which has carried on in to 2021. Prior to, some business leaders might have figured it...

read more
What is Identity and Access Management (IAM)?

What is Identity and Access Management (IAM)?

Identity and Access Management in regards to cybersecurity refers to a framework of policies, processes, and technologies that enable organisations to define and manage the roles and access privileges of users and devices. As a cyber security best practice, IAM is a...

read more
The Endpoint of the new normal

The Endpoint of the new normal

Over the last year and a half, what has been dubbed the “new normal” has slowly but surely become the “normal”. It is now common place for sensitive corporate work to be tackled in the home. Work-issued devices such as laptops, phones printers etc continue to populate...

read more
Bringing Self-Defence to Cybersecurity

Bringing Self-Defence to Cybersecurity

The day-to-day challenges faced by the modern CISO are monumental. You are charged with keeping your organisation’s most valuable assets safe from an increasingly sophisticated and growing number of threats. Remote workforces and advancing technology create more...

read more
Why sharing is caring in Cloud Security

Why sharing is caring in Cloud Security

Over the years software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) have really taken off with many organisations utilising one or all of these deployment models. Naturally, these deployment models come with their own...

read more
DataGroupIT opens new Lagos & Nairobi office

DataGroupIT opens new Lagos & Nairobi office

DataGroupIT is proud to announce we have opened two new offices across West and East Africa. Our new offices are in Lagos and Nairobi and offer our regional clients greater access to our team of cybersecurity experts who are dedicated to securing your reputation. Take...

read more
A simple guide to adopting Zero-Trust

A simple guide to adopting Zero-Trust

Implementing cybersecurity best practice in your organisation should always be viewed as a journey and not an event. The on-going process requires regular revision, adaptation, and evolution. One of the most recent steps in improving organisational security approach...

read more
The role of automation in cybersecurity

The role of automation in cybersecurity

The old proverb, Fight fire with fire, is taking on new meaning in the battle CISOs and CIOs are waging against increasingly well-resourced and dangerous cybercriminals. These cybercriminal syndicates—often linked to state actors—have been rapid adopters of emerging...

read more
The rise of ransomware in 2021

The rise of ransomware in 2021

The level of espionage, stealth and tech jargon associated with cybercrime can easily lead one to believe that “it only happens in the movies”. That couldn’t be further from the truth. In 2021 the global spotlight is firmly on cyber-criminals or more specifically,...

read more