Pinnacle’s new cyber security division has partnered with Comodo Cybersecurity to offer managed service providers a solution that blocks unknown cyber threats putting organizations at risk in South Africa.
Announcing the new opportunity for South African MSPs during a webinar held in partnership with ITWeb, Joseph Jaghab, Head of Partnerships at Comodo Cybersecurity, noted: “You will never prevent 100% of malware from entering your network.”
He said traditional security approaches can achieve a 99% detection rate, but there remains a 1% gap representing all the unknowns, with thousands of pieces of undetected malware daily.
Jaghab said Comodo prevented unknowns from entering the native environment, but allowed them to access an auto-containment vault – a replicated space within the kernel of the endpoint. “Unlike a sandbox, this is extremely lightweight and robust compared to a full VM, the process is fully automated, and the end-user will be able to safely access any unknown file, so productivity is not hindered.
The auto-containment works with Valkyrie (Comodo’s threat intelligence) to run a dynamic analysis, he said. “Ninety-five percent of the time, we determine if a file is good or bad in under 45 seconds. If Valkyrie can’t make a determination in that timeframe, our SOC team is available to make an analysis. They will reverse engineer that file in under four hours.”
Dr Erdal Ozkaya, CISO at Comodo Cybersecurity, said cyber security had changed and cyber risk had increased over the past year, making it all the more important for organisations to address the 1% gap presented by unknown threats. “Our world has changed – it is not the same world it was just two years ago as a result of COVID-19,” he said. “The way we live, communicate and work – and even the way we get hacked – has changed.
Everyone believes they have the best cyber security solutions – unfortunately they aren’t aware of what is happening in the cyber security landscape. Not a day goes past without news of a hack. There are now two types of organisations – those who know they have been hacked, and those who don’t. Going forward there will also be two kinds of organisations – those implementing the right steps and cyber security tools, and those who make it into the news.”
The Comodo Cybersecurity opportunity for local MSPs is designed to make it easy to onboard and manage security for customers. It includes Dragon Enterprise Platform and Auto Containment – the world’s only active breach protection that renders malware, ransomware and cyber attacks useless – and the Comodo SOCaaP managed threat detection and response service backed by Comodo’s in-house security operations centre and security information and event management.
For more information, go to https://www.pinnacle.co.za/comodo.
Joining Comodo Cybersecurity as CISO
THE STORY OF COMODO SECURITY SOLUTIONS (CSS), INC
In a world where preventing all cyberattacks is impossible, Comodo delivers an innovative cybersecurity platform that renders threats useless across the LAN, web and cloud.
The Comodo Dragon platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. It is highly effective at addressing the onslaught of ransomware. Based in Clifton, New Jersey, CSS has a 20-year history of protecting the most sensitive data for businesses and consumers globally. In 2018, CSS embarked on a journey to be the leader in endpoint security.
Today, CSS technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file to be handled accordingly by either software or human analysts. This shift from reactive to proactive makes CSS unique. It allows the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.
This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes a vital reality: while you cannot prevent 100% of malware – you can render malware useless.
Comodo’s Mission Statement :https://www.comodo.com/comodo-cybersecurity/
Cybersecurity Symposium Africa 2020. (Cape Town)
How Hackers Get your Password?
It’s not a secret anymore, Hackers know our passwords. 551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your passwords and then I will recommend you the industry best practices to keep you or at least your passwords safe ?
This is the most convenient way for hackers, instead of hacking 10.000 people, they hack a vulnerable web site, which has all the information they need. Yes, I know this sounds hard but in reality, it’s not. Just recently (3 April 2019) more than 540 million records which included extensive details, including people’s comments, likes, names, and Facebook IDs were found in Amazon unprotected. (plain text) (You can Read here the details )
Hackers can also steal “hashes”, like in 2012, LinkedIn was saving their user database unsalted, which means “a random data was not used as an additional input to a one-way function that hashes data, a password or passphrase. Salting in cryptography is used to safeguard passwords; keeping it short they had no extra safeguard implemented to protect the passwords)
To read the full article : https://www.erdalozkaya.com/how-hackers-get-your-password/