Page 15 - Logistics News - September October 2022
P. 15

C YB E R SE CUR I T Y






            Sebola says the most prevalent form of attack   and occurs on a quarterly basis. We also hold an annual
          is phishing, which seeks to get information from   Computer Security Day in November.”
          users. “You need a multifaceted approach to       
          protecting your information. We have perimeter   Like Sebola, Craig Rosewarne, MD of cybersecurity
          security, which involves firewalls. And, with operating   company Wolfpack Information Risk, believes everyone is
          systems, there’s always updates you need to do,   at risk of cyberattacks. “You could be an individual, a non-
          whether it’s an operating system update or security   profit, a small charity, it doesn’t matter. The hacker doesn’t
          update to eliminate vulnerabilities that the providers   care where the money comes from,” he says. “The harsh
          have identified.”                             reality is that attacks can’t be prevented, but organisations
                                                        can defend against them provided they recognise the
            Antivirus software is another must as part of   complexity of digital crimes and tackle them accordingly.”
          your endpoint security. “Your endpoint security is    
          also important to protect the confidentiality of your   For Sebola, this means continuously monitoring
          company information in case of stolen endpoint devices.   networks to establish any irregular patterns. “You have
          Sometimes we tend not to think about stolen goods and   to have an incident response plan in place, but you
          how they can be used in the process of a cyberattack.”  also can’t have a prescriptive one that is generic. This
                                                        plan will tell you who needs to be involved, who the
            However, Sebola stresses that the most important   contact people are, and not just from IT. You need to
          aspect of cybersecurity is user awareness. “The majority   establish who is involved from legal, operations and the
          of successful attacks happen here. If your users are not   communications side because there are various aspects
          aware, it’s like taking a key to your house and throwing it   that you want to consider.”
          over the security fence for attackers to use.”    
                                                           “When you have cyber insurance, part of
            “At BIL, we have an online programme where staff   the requirement is that you inform them of any
          can learn about security and the different types of   breaches. It’s important to keep logs from the IT side.
          attack – email impersonations, for example. If they   Make sure you contain the attack so you can preserve
          spot an email that looks a bit suspicious, we’ve got a   the evidence. This is important in terms of the analysis
          special process where they can send an alert for us to   later on to prevent such a breach from happening again,”
          investigate. This forms part of our induction process   he concludes. •






















                                                                                                             L O GI S T I CS NEWS











          www .l o g ist i csn e w s .c o .z a                            SEP T E MB E R/O CT O B E R 2022  13
   10   11   12   13   14   15   16   17   18   19   20