<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/mfa/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #MFA</title><description>Lifu Technologies - Blog #MFA</description><link>https://www.lifutechnologies.co.za/blogs/tag/mfa</link><lastBuildDate>Thu, 16 Apr 2026 13:31:46 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Cost and frequency of a data breach by initial attack vector]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Cost-and-frequency-of-a-data-breach-by-intial-attack-vector</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Cost and frequency of a data breach by intial attack vector.png"/>Cost and frequency of a data breach by intial attack vector - IBM Cost of a Data Breach Report 2024]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Ouz_HoDmROKyeE4pYPoHYA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LbyHoCuOQwmrXONYviXpag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ykwhic4STwSBgmNTJcAJhg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ixrTqP5cQlucDlpYTfRyPg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Don’t let a data breach disrupt your business </span></h2></div>
<div data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ"] .zpimagetext-container figure img { width: 919px !important ; height: 516px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cost%20and%20frequency%20of%20a%20data%20breach%20by%20intial%20attack%20vector.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>Interesting to see which attack vectors are the most successful. Talk to us about how our Prevent &amp; Protect solution can minimize the risk in these attack vectors or read about it here:&nbsp;</p><p><span style="color:rgb(129, 129, 129);"><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Zafepass Prevent &amp; Protect" rel="">Zafepass Prevent &amp; Protect</a></span><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Read about Prevent and Protect" rel=""><span style="color:rgb(129, 129, 129);"><br></span></a></p><p></p><p></p></div>
</div></div><div data-element-id="elm_OLUPwc97TNu68O9YeJfMCQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Be prepared for breaches by understanding how they happen and learning about&nbsp;the factors that increase or reduce your costs. New research from IBM and&nbsp;Ponemon Institute provides insights from the experiences of 604 organizations and&nbsp;3,556 cybersecurity and business leaders hit by a breach. Empower yourself with&nbsp;real-world examples and expert recommendations on how to mitigate the risks.</span></p></div>
</div><div data-element-id="elm_b2EXBarqRXOTlBzGtdktfg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.ibm.com/reports/data-breach" title="Link to the download site"><span class="zpbutton-content">Register with IBM for a copy of the full report</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 02 Aug 2024 10:13:07 +0200</pubDate></item><item><title><![CDATA[Practical Cyber Security advice for owners of SME with minimal budget]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Practical-Cyber-Security-advice-for-owners-of-SME-with-minimal-budget</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Low budget Cyber Security.png"/>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC)]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_df8w4HfdSWiZkHVT12iyGQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_H1hY-iixSumOzGDc0s0UoQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ESgSYeYnRiazua4lzpcjAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span>Thereafter: Assume compromise of EVERYTHING</span></b></span></h2></div>
<div data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;"><span>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. &nbsp;Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC). Hackers offer phishing and business email compromise online as a service and utilize AI to increase volume and precision. Email addresses, phone numbers etc. they have from numerous data breaches.</span></span><span style="color:inherit;"><span>The best defense against this is creating awareness among your family, employees, about digital hygiene, which includes: </span></span><br><ul><li><span style="color:inherit;"><span>&nbsp;Questioning any request of data by following a link in a SMS. (Log on directly to the bank, Tax services, etc. and respond to queries there)</span></span></li><li><span style="color:inherit;"><span>Do not announce on e.g., Facebook that the whole family is on vacation.&nbsp;</span></span></li><li><span style="color:inherit;"><span>Double check odd requests from family/employees/bosses by a separate comms channel, e.g., use WhatsApp if the request came from email.</span></span></li><li><span style="color:inherit;"><span>Review your password reset procedures and include call-back, send the reset password to the employees' manager, so identification can be verified.</span></span></li><li><span style="color:inherit;"><span>Data privacy acts e.g., GDPR(EU), POPIA(ZA) applies basically to any organisation, so at a minimum this has to be addressed.</span></span></li><li><span style="color:inherit;"><span>Only install SW that is downloaded from the vendors website and minimize browser plug-ins. (Take extra care if you let your kids use your laptop/smart phone.)<br>&nbsp;<br>While not 100% guarantee for security, enabling multi-factor-authentication (<span style="font-weight:bold;">MFA</span>) will raise the defenses and hackers will potentially move on to the next potential victim.<br>&nbsp;<br>Finally, make sure your IT-department and/or IT Service provider is updated on <span style="font-weight:bold;">SW Security patches</span> as vulnerabilities are published.<br>&nbsp;<br>&nbsp;<br><span style="font-weight:bold;">Thereafter: Assume compromise of EVERYTHING</span><br>&nbsp;<br>In august a hosting company with 300 clients was hacked and everything was encrypted (including backups) and held for ransom, as a result several companies have declared bankruptcy with more to come. In the end the owner(s) are responsible and lesson #1 is to take data backups (systems can be re-created) and store the files at a different location. <br>&nbsp;<br>Recreation can take time days/weeks, so consider what is absolutely critical data/information required to continue production/operations for e.g., a week and make a plan for that. Thereafter test the plan.<br>&nbsp;<br></span></span><div style="text-align:left;"><span style="color:inherit;"><span>If you use cloud providers e.g., MS 365, do not assume they automatically backup your data. They can, but typically it is a separate billable service!</span></span></div></li></ul></div></div>
</div><div data-element-id="elm_YLaH8ZsoRGKDARI5Injmhw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 06 Oct 2023 15:07:38 +0200</pubDate></item></channel></rss>