• Home
  • Games
    Action-adventure Simulation Business Role Playing Sports Competition Casual Intelligence Card Strategy Music Rhythm Text Puzzle Flying Shooting Love Development
  • Apps
    Business Office Newsletter Social Life Entertainment Online Shopping Practical Tools Travel Financial Management Educational Learning Information Reading Sports and Health
  • Articles

English 中文(简体) 中文(繁体) 한국어 日本語 Português Español Русский العربية Indonesia Deutsch Français ภาษาไทย
Home Apps Educational Learning Transformer 02 2014
Transformer 02 2014

Transformer 02 2014

1
2
3
4
5
Download
  • Version 1.0
  • Category Educational Learning
  • Package Name co.za.itweb.transformer0214
  • Update Time December 22, 2024
  • Size 13.79MB
About this app

Transformer 02 2014

In 2012, the hacktivist collective Anonymous broke into the mail server of Syria’s Ministry of Presidential Affairs and accessed the e-mail accounts of a number of officials. A few months later over 2.4 million e-mails from that attack were given to Wikileaks.

In 2013, Barack Obama’s Facebook and Twitter accounts, and the e-mail accounts of his staffers, were hacked by the Syrian Electronic Army. In a non-related story, the Twitter accounts of Burger King, Jeep and Top Gear presenter Jeremy Clarkson were among others compromised during the year. Ironically, in 2013, Anonymous’ Twitter account was also hacked.

In 2014, as millions of soccer fans were watching the Brazilian football World Cup, a much smaller number of local hackivists were taking down the websites of supporting organisations including the Brazilian Intelligence System, Hyundai Brazil, Brazil’s Football Confederation and Bank of Brazil.

More recently, Hollywood’s Jennifer Lawrence and Kirsten Dunst along with The Big Bang Theory’s Kaley Cuoco and countless others all had nude pictures taken from their iCloud accounts and splashed across the internet. And it’s not only ‘big names’ who are targeted by cyber criminals. It’s said that more than 600 000 Facebook accounts are compromised every day.

There are of course many more examples, but it’s clear that cyber security issues have developed into significant problems that now require government and top-level corporate consideration.

A holistic approach is required to mitigate against cyber threats, requiring advanced and evolved identification, protection, detection and response capabilities across the organisation. Is it going to be expensive? Probably. But it’s still less costly than the cost of reparation once security has been breached. And Microsoft’s strategy is to assume breach. Assuming breach requires a shift in mind-set from prevention alone to containment after breach.

As such, managing risk is an important element of your cyber security approach, but before risk can be managed it needs to be identified and prioritised. Elements to consider are whether these risks are being assessed and addressed accordingly and are your staff sufficiently informed of the latest cyber threats? Do you have a cyber security strategy for your business and do you enforce it? Would you truly know if you have been breached? Can your business systems detect the undetectable? Are you doing enough?

With increasingly strict regulations about the safeguarding of information cyber security is certainly now a board-level issue. Businesses tend to think the risk of attack is relatively low, but if it does happen, the impact can be significant.

The outlook is clear: businesses need a proper cyber risk strategy that focuses budget on a holistic approach, one that complies with the five silos of security (identify, protect, detect, response, recover) as identified by the National Institute of Science and Technology. There will always be an element of risk. All people, processes and technology need to be covered by that risk mitigation strategy. And then – and only then – can your business be assured that it has an effective and resilient security architecture.

In this, the second issue of Transformer – the official publication of the CIO Council of South Africa, we take a long, hard look at cyber security, how it interplays with key megatrends, and related issues such as the PoPI Act. We also look at some of the considerations behind a security strategy, what to do in a crisis and how to handle one of the least well-documented threats – the sysadmin going rogue.

We hope you find this publication interesting, useful and thought-provoking.

Please let us know your feedback or questions at [email protected].

Marius Haman and Herman Opperman

Guest editors

Ulrike Weitz

Editor

[email protected]

Download(13.79MB)
Users also viewed
  • Listening English Practice 01

    Listening English Practice 01

    2.1 August 22, 2025
  • French conjugations

    French conjugations

    1.0.r1 August 21, 2025
  • Scratch Sensor

    Scratch Sensor

    2.0.1 August 21, 2025
  • Global Logistics Associates

    Global Logistics Associates

    5.55.14 August 20, 2025
  • Elements Compounds & Mixtures

    Elements Compounds & Mixtures

    2.0 August 19, 2025
  • Cursive Converter

    Cursive Converter

    14.0 August 19, 2025
  • iCRM

    iCRM

    1.1.10 August 19, 2025
  • Invest Australia Property

    Invest Australia Property

    1.15.20.78 August 19, 2025
  • FlipImageView library

    FlipImageView library

    1.0 August 18, 2025
  • 99MyCity

    99MyCity

    2.1.4 August 18, 2025
  • Game of Quotes

    Game of Quotes

    1.0.6 August 17, 2025
  • World Wide English

    World Wide English

    1.0.4 August 17, 2025
  • PGC

    PGC

    7.9.25 August 16, 2025
  • Timber Volume Calculator

    Timber Volume Calculator

    2.7.12.2 August 16, 2025
  • French with TV5MONDE lite

    French with TV5MONDE lite

    2.5 August 15, 2025
About Privacy Policy Terms of Service Cooking Policy

© Copyright 2017-2025 downzr.com