Recent attacks observed by the Iconis SOC team have revealed that hackers are employing increasingly sophisticated methods to bypass multi-factor authentication (MFA). As a security engineer, this trend caught my attention, and in this blog post, we will delve into how these attacks are executed and the measures you can take to defend against them.[…]
How Hackers Bypass 2FA: Insights from the Iconis SOC Team
By Jeffrey Cass Cyber Security Aug 28, 2024
Recent security breaches have underscored the vulnerability of organizations due to overlooked systems within their environments. This post delves into technical methodologies to identify these hidden assets and outlines strategies to leverage them against threat actors. Technique 1: Network Discovery Network discovery is a fundamental yet critical method that can be executed using existing network[…]
Navigating the Digital Landscape: What to Look Out for in New Year Cyber Threats
By Keagan Ancill Cyber Security Jan 16, 2024
As we step into a new year filled with possibilities and advancements in technology, it’s crucial to remain vigilant in the ever-evolving digital landscape. Cyber threats continue to grow in sophistication, targeting individuals, businesses, and even governments. To safeguard ourselves and our digital assets, it’s essential to be aware of the potential risks that may[…]
Surfing Safely Through the Festive Wave: Online Tips for a Great Time
By Keagan Ancill Uncategorised Dec 04, 2023
Hey there, South African buddies! The festive season is knocking, and while we’re all in for a good time, let’s not forget to keep our online vibes positive and secure. Here are some laid-back tips to make sure your digital dance remains glitch-free during this festive time. Give Your Gadgets a High-Five:Start by fist-bumping your[…]
In today’s digital age, Information Technology (IT) is the backbone of almost every business and organization. From small startups to large enterprises, IT services are essential for operations, communication, and growth. However, poor IT service delivery can have significant and far-reaching consequences, impacting productivity, security, customer satisfaction, and more. In this blog post, we will[…]
The Crucial Role of Penetration Testing in Strengthening Cybersecurity
By Keagan Ancill Cyber Security Jul 11, 2023
In our increasingly interconnected digital age, the security of our information systems is a top priority. Businesses and organizations are dealing with the ever-present threat of cyber attacks, and so, cybersecurity has become an essential part of operations. One strategy that organizations employ to identify and remedy their vulnerabilities is Penetration Testing. This practice, often[…]
7 Ways to Avoid Phishing this Easter
By Iconis admin Cyber Security Apr 05, 2023
Easter is a time for celebration, but unfortunately, it’s also a time when cybercriminals take advantage of people’s trust and goodwill to spread phishing scams. Phishing is a type of cyber-attack where criminals use fraudulent emails, messages, or websites to trick people into giving away sensitive information, such as login credentials, credit card numbers, or[…]
5 Reasons Your SME Needs Scalable IT
By Jason sewnarain Cyber Security Dec 21, 2022
Small and medium-sized firms, or SMEs, are defined differently across the world. The nation in which a corporation operates determines the specified size of a SME. Depending on the jurisdiction, a company’s size or classification as a SME might be based on a variety of factors. Annual revenue, the number of workers, the amount of[…]
Best Practices for Cybersecurity that Every Business Should Adopt
By Jason sewnarain Cyber Security Dec 14, 2022
Security policies should be updated. Businesses frequently have antiquated security policies that fail to account for the most recent technology, cyber-attacks, and cybersecurity best practices, such as zero-trust architectures. Enterprise security is built on security policies. First, update your rules, then your security processes, and last, teach your personnel so they understand with the new standards.[…]
5 Tips For Secure, Accessible Passwords When Working From Home.
By Jason sewnarain Cyber Security Dec 07, 2022
Strong passwords are essential for keeping you and your company safe. Iconis provides five password-creation recommendations. Many of us will want to keep things simple and use the same password you’ve been using for ten years since remembering 50 different passwords for 50 different accounts is difficult. However, doing so implies that your password will[…]