News

Load More

2020: On track to hit data breach record

As we are just over half way through the year, 2020 is already looking to have the highest number of data breaches to ever occur in one year. The facts so far: The number of records exposed in Q1 2020 skyrocketed to 8.4 billion – a 273% increase compared to Q1 2019. COVID-19 set cybercrime […]

Find out more

Coordinated Twitter hack hits Elon Musk, Obama, Bill Gates and more in Bitcoin scam

Yesterday, July 15th saw a number of high-profile Twitter accounts hacked and this may have been one of the biggest Twitter hack’s of all time. What happened? The scam targeted a number of well-known Twitter accounts, including that of Joe Biden, Barack Obama, Bill Gates, Elon Musk, Kanye West, Apple and many more. The hack […]

Find out more

Why Visibility Is Essential For OT Security

It could be argued that the most critical infrastructure systems of our society today are sustained and somewhat fully dependent upon by Operational Technology (OT). As our systems are undergoing more and more digital transformation, they become more connected, which leaves them more vulnerable. Critical infrastructure and modern manufacturing facilities are a complex mix of […]

Find out more

CMMC (Cybersecurity Maturity Model Certification) explained: What this means for defense contractors?

As of June 2020, many companies that work with the US DoD will soon need to meet CMMC requirements to bid on contracts. This has led to many enquiries into what exactly this means for companies and what they should be doing to get compliant. What’s new? CMMC will be replacing the existing self-certification model […]

Find out more

Managing Insider Threat

A lot of focus is placed on managing external threats by organisations, when in fact their biggest asset is also their biggest risk: People (Insider Threat). You can’t run a business without giving employees  access to resources, and you can’t give them that access without some degree of risk.  An insider threat is when a […]

Find out more

Cybercrime in the time of COVID-19

Updated 15th May 2020 Over the past few months we have been witnessing an increased amount of malicious attempts as many threat actors have started to abuse the panic and discomfort of the COVID-19 pandemic to conduct specially crafted cyber attacks. Our SOCs are continually seeing a significant spike in activity on Brute-Force attacks (authentication […]

Find out more

A Day In The Life Of A Pentester – Case Study

When it comes to performing a penetration test, one of the most important things is understanding how the application you are testing works. A pentester needs to know how it is used, all its functionalities and namely external libraries and what parts are custom-developed. In one of Smarttech247’s penetration testing engagements, we encountered an interesting […]

Find out more

The Importance of Data Classification

“Data classification is the process of categorizing data so organisations can understand what data they own, where it is located, what access controls are implemented and whether they are adhering to organisational measures and compliance regulations” In recent times, data classification has become a key component in numerous organisations’ data security procedures. Not only does […]

Find out more

A Letter Regarding COVID-19 from Smarttech247’s Management Team

The world is grappling with an issue of enormous scale and human impact, and our hearts go out to all who have been affected by the outbreak of coronavirus (COVID-19).  Even in times like these, cybersecurity doesn’t stop and we have a mission to keep protecting our customers – as usual and with no interruption. […]

Find out more