Page 15 - Logistics News - September October 2022
P. 15
C YB E R SE CUR I T Y
Sebola says the most prevalent form of attack and occurs on a quarterly basis. We also hold an annual
is phishing, which seeks to get information from Computer Security Day in November.”
users. “You need a multifaceted approach to
protecting your information. We have perimeter Like Sebola, Craig Rosewarne, MD of cybersecurity
security, which involves firewalls. And, with operating company Wolfpack Information Risk, believes everyone is
systems, there’s always updates you need to do, at risk of cyberattacks. “You could be an individual, a non-
whether it’s an operating system update or security profit, a small charity, it doesn’t matter. The hacker doesn’t
update to eliminate vulnerabilities that the providers care where the money comes from,” he says. “The harsh
have identified.” reality is that attacks can’t be prevented, but organisations
can defend against them provided they recognise the
Antivirus software is another must as part of complexity of digital crimes and tackle them accordingly.”
your endpoint security. “Your endpoint security is
also important to protect the confidentiality of your For Sebola, this means continuously monitoring
company information in case of stolen endpoint devices. networks to establish any irregular patterns. “You have
Sometimes we tend not to think about stolen goods and to have an incident response plan in place, but you
how they can be used in the process of a cyberattack.” also can’t have a prescriptive one that is generic. This
plan will tell you who needs to be involved, who the
However, Sebola stresses that the most important contact people are, and not just from IT. You need to
aspect of cybersecurity is user awareness. “The majority establish who is involved from legal, operations and the
of successful attacks happen here. If your users are not communications side because there are various aspects
aware, it’s like taking a key to your house and throwing it that you want to consider.”
over the security fence for attackers to use.”
“When you have cyber insurance, part of
“At BIL, we have an online programme where staff the requirement is that you inform them of any
can learn about security and the different types of breaches. It’s important to keep logs from the IT side.
attack – email impersonations, for example. If they Make sure you contain the attack so you can preserve
spot an email that looks a bit suspicious, we’ve got a the evidence. This is important in terms of the analysis
special process where they can send an alert for us to later on to prevent such a breach from happening again,”
investigate. This forms part of our induction process he concludes. •
L O GI S T I CS NEWS
www .l o g ist i csn e w s .c o .z a SEP T E MB E R/O CT O B E R 2022 13