As a top executive, how do you stay in charge of the bank’s most critical assets – your core banking infrastructure? How sure are you that no fraud is taking place and if it does you have systems to alert you in real time? As forensic experts and fraud examiners, we know investigating fraud is costly and disruptive. This is to interest you in Summit Consulting Ltd’s comprehensive Security-as-a-Service cyber threat intelligence, vulnerability management and continuous perimeter monitoring solutions. We harvest cyber threat data from multiple sources and deliver actionable intelligence so you can take preventive measures against different attacks…
Cybersecurity basics for law firms
The legal profession is built on the foundation of security (confidentiality, integrity and availability) of client secrets. You are right to say all professionals have a responsibility to keep their client’s secrets secret. How can a lawyer in Uganda with a team of paralegals and other likeminded staff each with a laptop / computer interconnected on the same network keep customers’ secrets on their computers secret? Put yourself in the shoes of a typical client of a law firm. You are a manager. You work in a department with other professionals. On 16th May 2017, you were asked to travel…
Bank security insights
For the starters if you look at the situation in banks, it is really very bad. A typical bank invests a lot of money into a strong room. The bank commits almost US$3billion to secure just US$1billion cash money; by building a hardened strong room to store bulk cash. Insurance companies will usually restrict a bank to keep too much money in the strong room. The insurance company will dictate on the amount they can cover. Anything beyond that will bad for the bank. Typically, a given bank has over Ugx2billionin safe. When banksset up the strong room, they will…
WannaCry/WannaCrypt Ransomware Q&A
Q. What Happened? A. On Friday May 12th 2017, several organizations were affected by a new Ransomware strain. The Ransomware was very successful in part because it used a SMB vulnerability to spread inside networks. The vulnerability was patched by Microsoft in March for supported versions of Windows. The exploit, known under the name ETERNALBLUE, was released in April as part of a leak of NSA tools. Variants have been seen spreading Saturday/Sunday. Q.How many infections? A. Several large organizations world wide are known to be affected. No obvious targeting. The organizations are from various countries and appear not to be…