<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/author/frederik/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog by Frederik</title><description>Lifu Technologies - Blog by Frederik</description><link>https://www.lifutechnologies.co.za/blogs/author/frederik</link><lastBuildDate>Thu, 16 Apr 2026 13:32:25 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[All-in-one trusted platform and Immune to breaches]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Bad-Actors-can-not-breach-businesses-that-adopt-stealth</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Bad actors can-t breach businesses that adopt stealth.png"/>immune to breaches from attack vectors like Malware/Ransomware, Port-scanning, Nation State attacks, DDOS attacks, Phishing, Code Injection, lateral movements, man-in-the-middle attacks, brute-force and infrastructure attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Hcvrvr1HSpulj2wXSumfuA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fxHeQQ11R_WkvtFULO418w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_xIL8gTsrSVq5pljpmLNk1Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_lhrs02RgT4SLo_xMtK7IGw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"></span><br/></h2></div>
<div data-element-id="elm_fMYUr7Dj_iAzEipo7wLTUA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fMYUr7Dj_iAzEipo7wLTUA"] .zpimage-container figure img { width: 800px ; height: 446.50px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-large zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Bad%20actors%20can-t%20breach%20businesses%20that%20adopt%20stealth.png" size="large" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_FXePjgQRRwS0gqbbpaNgTg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><p style="margin-left:0.5in;font-size:12pt;font-weight:400;"><span>ZafePass from Zafehouze ApS offers the following capabilities that can work well for many customers with IT and OT Networks<br/></span></p></div><div style="color:inherit;"><p style="margin-left:0.5in;font-size:12pt;font-weight:400;"><b><span><br/></span></b></p><ul style="text-align:left;"><li style="text-align:left;"><b><span>All-in-one trusted platform</span></b><span>: For the Enterprise where security, access management, file management and compliance work seamlessly together, minimising complexity and offers protection of known and unknown vulnerabilities <br/></span></li><li><span><b>I</b></span><b><span>mmune to breaches:</span></b><span>The Enterprise is immune to breaches from attack vectors like Malware/Ransomware, Port-scanning, Nation State attacks, DDOS attacks, Phishing, Code Injection, lateral movements, man-in-the-middle attacks, brute-force and infrastructure attacks. Offering the enterprise protection of their data, users and retains trust.</span></li><li><span><span style="font-weight:bold;">Virtual Private Connectivity:</span>&nbsp;Allows for point-2-point private, privileged and encrypted direct access between an employee and e.g. ERP server. These connections cannot be breached nor can information be extracted from them.</span></li></ul></div></div>
</div><div data-element-id="elm_HC-vGEXWRqGzPGD2Fil-Jw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20Zafepass%20Business%20Benefits%20Brochure_Oct%202024.pdf" download title="Detailed business benefits" title="Detailed business benefits"><span class="zpbutton-content">Business flyer</span></a></div>
</div><div data-element-id="elm_qIJheNXlsjTy1KfP3TnCQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Zafehouze%20LIFU%20draft-cybersecurity-framework-mapping-v1%2011-11-2023%2011-52-25-788%20copy.pdf" download title="How ZafePass Prevent &amp; Protect maps into various Security standards" title="How ZafePass Prevent &amp; Protect maps into various Security standards"><span class="zpbutton-content">For the CISO</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 24 Nov 2024 14:33:00 +0200</pubDate></item><item><title><![CDATA[Cost and frequency of a data breach by initial attack vector]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Cost-and-frequency-of-a-data-breach-by-intial-attack-vector</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Cost and frequency of a data breach by intial attack vector.png"/>Cost and frequency of a data breach by intial attack vector - IBM Cost of a Data Breach Report 2024]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Ouz_HoDmROKyeE4pYPoHYA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LbyHoCuOQwmrXONYviXpag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ykwhic4STwSBgmNTJcAJhg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ixrTqP5cQlucDlpYTfRyPg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Don’t let a data breach disrupt your business </span></h2></div>
<div data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ"] .zpimagetext-container figure img { width: 919px !important ; height: 516px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cost%20and%20frequency%20of%20a%20data%20breach%20by%20intial%20attack%20vector.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>Interesting to see which attack vectors are the most successful. Talk to us about how our Prevent &amp; Protect solution can minimize the risk in these attack vectors or read about it here:&nbsp;</p><p><span style="color:rgb(129, 129, 129);"><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Zafepass Prevent &amp; Protect" rel="">Zafepass Prevent &amp; Protect</a></span><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Read about Prevent and Protect" rel=""><span style="color:rgb(129, 129, 129);"><br></span></a></p><p></p><p></p></div>
</div></div><div data-element-id="elm_OLUPwc97TNu68O9YeJfMCQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Be prepared for breaches by understanding how they happen and learning about&nbsp;the factors that increase or reduce your costs. New research from IBM and&nbsp;Ponemon Institute provides insights from the experiences of 604 organizations and&nbsp;3,556 cybersecurity and business leaders hit by a breach. Empower yourself with&nbsp;real-world examples and expert recommendations on how to mitigate the risks.</span></p></div>
</div><div data-element-id="elm_b2EXBarqRXOTlBzGtdktfg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.ibm.com/reports/data-breach" title="Link to the download site"><span class="zpbutton-content">Register with IBM for a copy of the full report</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 02 Aug 2024 10:13:07 +0200</pubDate></item><item><title><![CDATA[Get over it – you will be hacked: ﻿﻿confronting and preparing for the reality of cyberattacks]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Get-over-it-–-you-will-be-hacked</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Berne-Union-90-logo.svg"/>The inevitability of cyberattacks is a stark reality in today’s digital landscape. With 3,205 reported data compromises in the US in 2023, representing a 72% increase over 2021[1] , businesses must acknowledge that cyber risk is on the rise.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D4RUdJAUQW22fnR1wCS2Bw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_A6UeL-NZRXqoY5VrRyeCHg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cdPsX90RQ5uz7l-mnHlDHw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_HI37RepDT46hzbVNmAVMNw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">It was a pleasure presenting to the Berne Union about Cyber Security and the potential impact to Credit Risks<br></h2></div>
<div data-element-id="elm_ZpmoOCTeS2ieOb0pTfgJWQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p>The full post is here : <a href="https://www.berneunion.org/Articles/Details/878/Get-over-it-you-will-be-hackedconfronting-and-preparing-for-the-reality-of" rel=""></a><br></p><p></p></div>
</div><div data-element-id="elm_7FqfTMtAxjuVUDrz4ArZKA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_7FqfTMtAxjuVUDrz4ArZKA"] .zpimage-container figure img { width: 535px !important ; height: 95px !important ; } } [data-element-id="elm_7FqfTMtAxjuVUDrz4ArZKA"].zpelem-image { margin-block-start:18px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.berneunion.org/Articles/Details/878/Get-over-it-you-will-be-hackedconfronting-and-preparing-for-the-reality-of" target="" title="The link will take you to the article" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Berne-Union-90-logo.svg" size="custom"/></picture></a></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 30 Jul 2024 10:16:17 +0200</pubDate></item><item><title><![CDATA[What is the difference between ISO 27001 and SOC?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/cobit-5-itil-v3-iso-27001-information-security-management-system-and-iso-9001-quality-management-sys1</link><description><![CDATA[CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0Qa6FU8GR8GIehzpT9EhOQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KdD1flFUS-iS9yC6qMOr6Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_anp9Wc_JTguWP_R0uS4ovg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_izJe-N-yS6emTFw0FJSW-A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p><span>ISO 27001 is the&nbsp;<b>Standard</b>&nbsp;that establishes requirements for an Information Security Management System (ISMS), a set of practices to define, implement, operate, and improve information security. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>While SOC refers to&nbsp;<b>a set of audit reports</b>&nbsp;to evidence the level of Conformity of Information Security Controls’ design and operation against a set of defined criteria (TSC), </span></p></div></h2></div>
<div data-element-id="elm_WrLIy1SmTiejKULOjM9tnA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p align="center" style="text-align:center;"><b><span style="font-size:14pt;">Comparison between ISO 27001:2022 and SOC</span></b></p><p align="center" style="text-align:center;"><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001:2022 Revision defines requirements and Controls for the systematic Protection of Information, including PII which are Applicable to Organizations/Entities of any size across Industries that require Compliance with the Standard. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>The Information Security Management System (ISMS), defined in Clauses 4 through 10 of the Standard, provides Directives to Organizations/Entities as to provide Guidance to ensure its Security Compliance are aligned with identified/adopted objectives and outcomes (eradication/mitigation of Threats as a result of incidents, operational optimization, etc.), predicated upon an EFFECTIVE Risk Management approach.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What is the relationship between ISO 27001:2022 and SOC?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001 has at a minimum the following controls that can be used to comply with the Trust Services Criteria:</span></p><img src="/Compare%20between%20ISO%2027001%20and%20SOC%20.png"><br><span style="font-size:5pt;">&nbsp;</span><p><b><span>ISO 27001 vs SOC</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>It is not a question of whether ISO 27001 vs. SOC 2, as SOC is an Audit report, while ISO 27001 is a Standard to establish an Information Security Management System (ISMS)</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>Hence SOC can be considered as an output, delivered by an ISO 27001 ISMS Implementation.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>In effect the appropriate relationship between ISO 27001 and SOC is as follows: </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>1.ISO 27001 Certification is not Mandatory to create an SOC report</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>2.The ISMS can provide, without major additional cost and effort, a solid basis for preparing this report, whilst increasing Clients/Customers’ confidence that the Organization can <b>Protect their Information/Data</b>.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What is the difference between ISO 27001 and SOC?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001 is the&nbsp;<b>Standard</b>&nbsp;that establishes requirements for an Information Security Management System (ISMS), a set of practices to define, implement, operate, and improve information security. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>While SOC refers to&nbsp;<b>a set of audit reports</b>&nbsp;to evidence the level of Conformity of Information Security Controls’ design and operation against a set of defined criteria (TSC), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Definition.</span></b><span>&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 is a Standard that establishes requirements for an Information Security Management System (ISMS).</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC refers to a set of audit reports to evidence the level of conformity to a set of defined criteria (TSC), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Applicability by industry.</span></b><span>&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 – for Organizations of any size or industry.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 – for Service Organizations from any industry, </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Compliance</span></b><b><span style="font-size:11.5pt;">.</span></b><span style="font-size:11.5pt;">&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 is certified by ISO certification body.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 is attested by a licensed Certified Public Accountant (CPA), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What are the Objectives?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 – to define, implement, operate, control, and improve overall security.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 is intended to prove Security level of Systems against static principles and criteria</span></p><style>@font-face {}@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }p.MsoFooter, li.MsoFooter, div.MsoFooter { margin: 0cm; font-size: 11pt; font-family: "Calibri", sans-serif }p.MsoNoSpacing, li.MsoNoSpacing, div.MsoNoSpacing { margin: 0cm; font-size: 11pt; font-family: "Calibri", sans-serif }span.FooterChar { }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }ol { margin-bottom: 0cm }ul { margin-bottom: 0cm }</style></div><p>.</p></div>
</div><div data-element-id="elm_IGp5G6MiSnmNXxO1Vw3F7Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Jan 2024 12:45:51 +0200</pubDate></item><item><title><![CDATA[CoBIT 5, ITIL V3, ISO 27001  Information Security Management System and ISO 9001 Quality Management System]]></title><link>https://www.lifutechnologies.co.za/blogs/post/cobit-5-itil-v3-iso-27001-information-security-management-system-and-iso-9001-quality-management-sys</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/ISO-27001-768x660-2644051505.png"/>CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_AYXMTws1TX6NUCzWy9jzMg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_O3nlov8KQjKDVIBwpYFQzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8Mygw7pwQ2e4iktb74DIoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5pWTyceOT7uJVMPOjGVWfA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5pWTyceOT7uJVMPOjGVWfA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="font-size:11pt;">LIFU Technologies is delighted to share that <span style="text-decoration:underline;"><a href="https://www.linkedin.com/in/glenard-o-moore-096a42264/" title="Glenard O'Moore" target="_blank" rel="">Glenard O'Moore</a></span> has joined us to offer certification services like ISO 27001 and 9001. Glenard has also been appointed CISO for Lifu Technologies.</span><style>@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }</style></div></div></h2></div>
<div data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width: 200px ; height: 171.88px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width:200px ; height:171.88px ; } } @media (max-width: 767px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width:200px ; height:171.88px ; } } [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/ISO-27001-768x660-2644051505.png" width="200" height="171.88" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_O3qWv1eYRJuHaJcZ1kb48g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O3qWv1eYRJuHaJcZ1kb48g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><span>Glenard has more than 15 years’ experience in implementing and Auditing “Best Practice” Frameworks, and Standards such as CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System</span></p><p><span>Qualifications:</span></p><p><span>Certified ITIL Expert</span></p><p><span>Certified CoBIT Assessor</span></p><p><span>Certified ISO 27001 Lead Auditor</span></p><p><span>Certified ISO 9001 Lead Auditor</span></p><p><span>DevOps Practioner</span></p><p><span><br></span></p><p><span style="font-style:italic;">References include:&nbsp;</span></p><p><span>Implementation of ITIL in the Ministry of Finance and Office of the Prime Minister in Namibia where 16 Government Employees were trained and Certified as ITIL Experts</span></p><p><span><br></span></p><p><span>Establishment of GRC in accordance with Public Service Administration in Namibia <br></span></p><p><span><br></span></p><p><span>In collaboration with DD Limpopo, establishment of DPSA CGICT defined Core Practices at the then, newly established Collins Chabane Local Municipality</span></p><p><span><br></span></p><p><span>Implementation of ISO 27001 Information Security Management for QR-Connect in the Netherlands and Zafehouze ApS in Denmark. <br></span></p><style>@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }</style></div>
<p></p></div></div><div data-element-id="elm_gI1pl5tIRNypSocHsPnNHg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_gI1pl5tIRNypSocHsPnNHg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Jan 2024 12:45:51 +0200</pubDate></item><item><title><![CDATA[ISO 27001 - NIST - CoBIT - Integrated Framework Model]]></title><link>https://www.lifutechnologies.co.za/blogs/post/ISO-27001-NIST-CoBIT-Integrated-Framework-Model</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/logo_medium_resolution.png"/>amely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jpO1tKuKTTOjhnc9SXJ9iw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2HIZ5DIuSeuoK5XUxnr9eQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ij3dE_uKSPKUEMA2u8vkQQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Executive Summary<br></h2></div>
<div data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:11pt;">The increase in concern among businesses and customers about protecting their information has led to more complex security requirements, many times involving the integration of multiple approaches. </span></p><p><span style="font-size:11pt;">In turn, modern information security implementation projects have become even more challenging, especially information technology processes. </span></p><p><span style="font-size:11pt;">And, when we talk about integrating approaches, it is not a question of simply creating a single list of what each approach requires and implementing them, but rather to coordinate these requirements, through trade-offs between conflicting objectives and alternatives, and by reinforcing the common ones, so that the implemented requirements can meet the expected overall outcomes. </span></p><p><span style="font-size:11pt;">Therefore, before ensuring compliance with requirements, it is paramount to consider a process of integrating security practices into business activities, but strange as it may seem, there are not many readily available materials regarding integrating practices. </span></p><p><span style="font-size:11pt;">Our approach embraces the three areas, namely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added </span></p><p><span style="font-size:11pt;">We will present their similarities and differences, and how they can be used together during an information security implementation project to improve information protection. <br></span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-style:italic;">The Paper is written by <a href="https://www.linkedin.com/in/glenard-o-moore-096a42264/" title="Glenard O'Moore" target="_blank" rel="">Glenard O'Moore</a>, CISO of Lifu Technologies and certified auditor on various standards<br></span></p><p></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%2027001%20NIST%20CoBIT.pdf" download><span class="zpbutton-content">Read the paper</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 10 Jan 2024 12:31:28 +0200</pubDate></item><item><title><![CDATA[Can you steal what can't be detected?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/can-you-steal-what-can-t-be-detected</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Zafepass - can you steal what can-t be detected.png"/>"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete" R. Buckminister Fuller]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_r75yeQ3xTWSPC4SR-FL8aw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zEcJLN4jRRy4OK-YL4hIEQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pK90rApOQA-MmXjato0UZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tu8g6HrwRe6zQz3Q-DwXJQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tu8g6HrwRe6zQz3Q-DwXJQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">&quot;You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete&quot; R. Buckminister Fuller</span></h2></div>
<div data-element-id="elm_6gqK2w5wTAm-vtCGeSxrGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6gqK2w5wTAm-vtCGeSxrGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Download this document and you can read how we can turn<br></p></div>
</div><div data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width: 1047px !important ; height: 695px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width:1047px ; height:695px ; } } @media (max-width: 767px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width:1047px ; height:695px ; } } [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cyber%20Security%20thinking.png" width="1047" height="695" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_sivINY4SVPlWwAyF44_21g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sivINY4SVPlWwAyF44_21g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">to this<br></p></div>
</div><div data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width: 1070px ; height: 562.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width:723px ; height:379.91px ; } } @media (max-width: 767px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width:415px ; height:218.07px ; } } [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Zafepass%20-%20can%20you%20steal%20what%20can-t%20be%20detected.png" width="415" height="218.07" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Nqrje8JGQwuv1H6NOcRNow" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Nqrje8JGQwuv1H6NOcRNow"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20-%20Why%20a%20Prevent%20and%20Protect%20Mindset%20is%20Changing%20Cyber.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 30 Nov 2023 13:07:47 +0200</pubDate></item><item><title><![CDATA[Paradigm-shift-in-Cyber-Security-approach?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Paradigm-shift-in-Cyber-Security-approach</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Zafepass and OSI layers.png"/>The Zafepass Prevent & Protect platform are by design leveraging Guard-Railed, Micro- Perimeter, and De-perimeterization based methodologies for ‘access and security’]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_hMgjLv0JQdeOWnhflrJSXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_x5A3MPYfTQ6wBfdvgJRH3Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_iFc-nAz4Qme4dqOh-wxAsw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_C1baPGyAehhXFE8gBw6rBA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width: 1070px ; height: 627.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width:723px ; height:424.32px ; } } @media (max-width: 767px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width:415px ; height:243.56px ; } } [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Zafepass%20and%20OSI%20layers.png" width="415" height="243.56" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_DZVCxiwVQ6WqMJ02iAUiYw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DZVCxiwVQ6WqMJ02iAUiYw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1><span>Zafepass Prevent &amp; Protect – Fast Facts Intro</span></h1></div></h2></div>
<div data-element-id="elm_1WnuUwfISVSa70A2VWTPrw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1WnuUwfISVSa70A2VWTPrw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p><br></p><p style="text-align:left;"> The Zafepass Prevent &amp; Protect platform are by design leveraging&nbsp;<span style="color:inherit;">Guard-Railed, Micro- Perimeter, and De-perimeterization</span> based methodologies for ‘access and security’. </p><p style="text-align:left;"> These are innovative approaches that organizations would adopt to address the challenges posed by the evolving landscape of IT (Information Tech.), OT (Operational Tech.), and IoT (Internet of Things) environments. </p><p style="text-align:left;"> These approaches offer several advantages compared to traditional security measures like VPN (Virtual Private Network), PKI (Public Key Infrastructure), IAM (Identity and Access Management), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention), and XDR (Extended Detection and Response), just to mention a few. </p><p style="text-align:left;"> Let's break down the advantages of the new approaches and the problems with the traditional ones: </p><p style="text-align:left;"> Advantages of Guard-Railed, Micro-Perimeter, and Deperimeterization: </p><ol style="text-align:left;"><li>Segmentation and Reduced Attack Surface: The Zafepass approach focus on micro-segmenting down to individual resources, the access and the user-sessions by creating isolated micro-perimeters around every asset, application and/or data. This segmentation reduces/minimizes the attack surface and make it impossible for threats to move laterally to any other ‘micro-perimeter’ (segment).</li><li>Granular Access Control: Instead of granting broad network access through VPNs, Zafepass enforce granular access controls including ‘environmental fingerprints’ ensuring only entitles users and devices are allowed access the specific resources they need. The risk of unauthorized access is hereby mitigated.</li><li>Beyond ZeroTrust, SASE, SSE, Software Defined Perimeter and alike: The Zafepass design exceeds ‘these frameworks’ in several ways. Assuming compromise of any- thing, least privileged access and constant validation has been part of our design for 20 years. Every access request is authenticated and authorized’ regardless of whether the request originates from inside or outside the perimeter. The design includes constant validation, advanced obfuscation and preventive mechanisms, as well as ephemeral connectivity and end-to-end dynamic encryption.</li><li>Adaptability to IoT and OT: As IoT and OT devices proliferate, traditional security solutions struggle to manage and secure these devices. The Zafepass Guard-Railed and Micro-Perimeter approaches are designed to handle the unique access and security challenges posed by these environments.</li><li>Contextual Awareness (Attribute Based Access, Communication and Identity Control): Zafepass Prevent &amp; Protect incorporate contextual awareness, taking into account, user behavior, device health, and other factors to make access decisions. Zafepass’ dynamic non-interruptive approach enhances security without causing unnecessary friction for legitimate users or lead to operational disruption.</li><li>Cloud-Centric Security: With organizations increasingly adopting cloud services, traditional security measures can become less effective. The Zafepass approaches are designed with cloud environments in mind, ensuring consistent security across on-premises and cloud-based resources.</li></ol><div><br></div><p style="text-align:left;"> Challenges with traditional solutions (VPN, PKI, IAM, CASB, DLP, XDR): </p><ol style="text-align:left;"><li>Limited Perimeter Protection: Traditional perimeter-based security, such as VPNs, relies on the assumption that internal network traffic is trusted. This approach becomes less effective as remote work, BYOD (Bring Your Own Device), and cloud services blur the traditional network boundaries.</li><li>Complexity and User Experience: Traditional solutions like VPNs and PKI can introduce complexity for users, leading to poor user experience. Users often find VPN connections cumbersome, and PKI management can be challenging.</li><li>Scalability Challenges: As organizations scale and adopt new technologies, managing identities and access control through IAM can become complex and resource-intensive.</li><li>Lack of Visibility: Traditional solutions might lack visibility into cloud services and applications, making it difficult to enforce consistent security policies across all environments.</li><li>Inadequate for IoT and OT:Traditional security solutions are often ill-equipped to handle the unique challenges posed by IoT and OT devices, which may have limited security capabilities and diverse communication protocols.</li><li>Alert Fatigue: Traditional security solutions like XDR and DLP can generate a high volume of alerts, leading to alert fatigue for security teams and potentially causing critical alerts to be overlooked.</li><li>Data Protection Challenges: While DLP solutions aim to prevent data loss, they might struggle to effectively monitor and protect data in decentralized, cloud- based, and IoT / OT environments.</li></ol><p style="text-align:left;"> Zafepass offer a more adaptive and dynamic approach to access, communication and security in today's complex IT, OT, and IoT landscapes. <br></p><p style="text-align:left;"><br></p><p style="text-align:center;"> All rights reserved. Zafehouze 2023 </p></div></div><p></p></div>
</div><div data-element-id="elm_ilm9UNljRj-CE4Lp4pdr-g" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 07 Nov 2023 11:33:55 +0200</pubDate></item><item><title><![CDATA[Practical Cyber Security advice for owners of SME with minimal budget]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Practical-Cyber-Security-advice-for-owners-of-SME-with-minimal-budget</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Low budget Cyber Security.png"/>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC)]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_df8w4HfdSWiZkHVT12iyGQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_H1hY-iixSumOzGDc0s0UoQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ESgSYeYnRiazua4lzpcjAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span>Thereafter: Assume compromise of EVERYTHING</span></b></span></h2></div>
<div data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;"><span>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. &nbsp;Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC). Hackers offer phishing and business email compromise online as a service and utilize AI to increase volume and precision. Email addresses, phone numbers etc. they have from numerous data breaches.</span></span><span style="color:inherit;"><span>The best defense against this is creating awareness among your family, employees, about digital hygiene, which includes: </span></span><br><ul><li><span style="color:inherit;"><span>&nbsp;Questioning any request of data by following a link in a SMS. (Log on directly to the bank, Tax services, etc. and respond to queries there)</span></span></li><li><span style="color:inherit;"><span>Do not announce on e.g., Facebook that the whole family is on vacation.&nbsp;</span></span></li><li><span style="color:inherit;"><span>Double check odd requests from family/employees/bosses by a separate comms channel, e.g., use WhatsApp if the request came from email.</span></span></li><li><span style="color:inherit;"><span>Review your password reset procedures and include call-back, send the reset password to the employees' manager, so identification can be verified.</span></span></li><li><span style="color:inherit;"><span>Data privacy acts e.g., GDPR(EU), POPIA(ZA) applies basically to any organisation, so at a minimum this has to be addressed.</span></span></li><li><span style="color:inherit;"><span>Only install SW that is downloaded from the vendors website and minimize browser plug-ins. (Take extra care if you let your kids use your laptop/smart phone.)<br>&nbsp;<br>While not 100% guarantee for security, enabling multi-factor-authentication (<span style="font-weight:bold;">MFA</span>) will raise the defenses and hackers will potentially move on to the next potential victim.<br>&nbsp;<br>Finally, make sure your IT-department and/or IT Service provider is updated on <span style="font-weight:bold;">SW Security patches</span> as vulnerabilities are published.<br>&nbsp;<br>&nbsp;<br><span style="font-weight:bold;">Thereafter: Assume compromise of EVERYTHING</span><br>&nbsp;<br>In august a hosting company with 300 clients was hacked and everything was encrypted (including backups) and held for ransom, as a result several companies have declared bankruptcy with more to come. In the end the owner(s) are responsible and lesson #1 is to take data backups (systems can be re-created) and store the files at a different location. <br>&nbsp;<br>Recreation can take time days/weeks, so consider what is absolutely critical data/information required to continue production/operations for e.g., a week and make a plan for that. Thereafter test the plan.<br>&nbsp;<br></span></span><div style="text-align:left;"><span style="color:inherit;"><span>If you use cloud providers e.g., MS 365, do not assume they automatically backup your data. They can, but typically it is a separate billable service!</span></span></div></li></ul></div></div>
</div><div data-element-id="elm_YLaH8ZsoRGKDARI5Injmhw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 06 Oct 2023 15:07:38 +0200</pubDate></item><item><title><![CDATA[Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Twilight-Cyber</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Twilight Cyber.png"/>Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_BslbzaGpQPGV8_jkINrMTQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pffNirujR5ya21NJL3hTPw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_m-mDJ1dPRceVI_X8VTfRYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_mnkoHQBATDa6Tnpe1Hq-7A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mnkoHQBATDa6Tnpe1Hq-7A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>Swift Detection, Bolstering Security with Complete Intelligence</h1></div></h2></div>
<div data-element-id="elm_qsoDr3HuRFCuPKbl936OdA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qsoDr3HuRFCuPKbl936OdA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p>In an increasingly digital world, the security of online systems and data is paramount. One key vulnerability is compromised credentials – usernames, passwords, and cookies that have been stolen or exposed and are utilized by bad actors to attack your organization. leading to catastrophic outcomes, including devastating ransomware attacks and data breaches.</p><p>In this high-stakes environment, the early detection of compromised credentials is more than just a best practice – it’s a necessity. By identifying and addressing compromised credentials swiftly, organizations can act before cybercriminals do, preventing ransomware attacks, protecting their data, and preserving their operations and reputation.</p><p>With Twilight Cyber, we specialize in detecting compromised credentials in the critical, first few hours post the initial leak. Such an extremely early detection provides actionable intelligence, empowering organizations to stay one step ahead of potential threats. Join us in our mission to secure the digital world and prevent the next big ransomware attack.</p></div><p>.</p></div>
</div><div data-element-id="elm_0PnrslSZSXKgcRJQB_Gu3w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0PnrslSZSXKgcRJQB_Gu3w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" target="_blank" title="Request a demo by filling out a form"><span class="zpbutton-content">Request more information</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 25 Sep 2023 07:47:28 +0200</pubDate></item></channel></rss>