Blog

Ensuring Safety and Security When Working Remotely

The Covid-19 pandemic has compelled industries to adopt remote work. Discover the challenges of working remotely...

The international Covid-19 pandemic has resulted in a number of industries and employers being compelled to allow employees work remotely from home. The fundamental challenges when working remotely encompasses emotional, procedural and habitual trials. Uncertainty and tension in terms of working remotely is such an international concern that several academics have opted to refer to it as the “new normal”.

This blog article will examine both physical and security practices that need to be adhered to by both employers and employees in order to remain motivated and stay secure. At the same time, both are pioneers in embarking on a journey in traversing an entire new world within an ever-complex and evolving digital and cyber security environment. It is further a given that a number of business enterprises will emerge from the pandemic profitable and stronger than ever, whereas an equal number of (or more) businesses may not surface to fight another day at all.

From the onset, it is imperative for employers and individuals in leadership positions to be aware of the fact that the end of the Covid-19 pandemic is by no means in sight. It is therefore critical for employers to examine means and ends to inform, educate and empower employees that are already anxious and uncertain about their personal well-being and professional security. This will ensure encompassing profitability, productivity, empathy and departmental sustainability for both employers and employees.

Did You Know?

Findings have illustrated that 86% of employees want to go back to working in an office. Among the key concerns cited by employees were the lack of social interaction, ease of communication and a general sentiment that working from home created a sense of lethargy and inactivity. These concerns make it imperative for employers to ensure that physical, mental and cyber security processes are place throughout the respective organisation, enterprise or department.

It is imperative to empower employees through continuous and detailed communication and to provide them with applicable tools to do so. This will jointly ensure employees feel they are valued and strategic engagement will ensure employees feel supported. Relevant and updated hardware, like mobile phones and laptops, airtight system passwords and Information and Communication Technology (ICT) software will ensure a seamless connection between each other and management similar to a real office.

At the same time, means of effective communication will ensure sustainable collaboration between employees and with the employer. Organisations need to look to technology to enable teams carry out asynchronous work. For example, collaboration tools that allow teams to work on projects together without being present at the same time can empower individuals to manage their own schedules. To stay productive, inspired and efficient, organisations should look at implementing technology that allows individuals to find the required files, research, contacts and diaries with the click of a button.

Cyber Criminals

Cyber criminals are aware of the propagating desire by employees for social interaction and a means to relieve constant lethargy and boredom. They are using the pandemic as an opportunity to develop contemporary vectors of attack, new exposure surfaces to exploit and new ways to steal the personal data of employees or the trade secrets of companies. Cyber criminals are further also aware that employees will be connecting to their companies’ servers for means of online communication, interaction, connection, sharing of files and browsing.

At the same time, cyber criminals are also aware that many employees will be doing their work on computers normally used for personal affairs and that other workers will rely more on their mobile devices in the absence of an official personal computer or laptop. This will inevitably result in employees who are working from home may be more apt to blend their business and personal lives with one another blurring the ever-important line between business and recreational activity.

How to Manage Cyber Security Processes

Among the key precautions that both employers and employees can take to manage cyber security processes include the following:

  • The proliferation of video conferencing software, such as Zoom and Microsoft Teams, ensure that employees are able to use secure services where the risk of unsolicited accessing data is reduced.
  • Always download software updates for all connected business devices including tablets, cellular phones, laptop and personal computers as soon as it is made available. Updates often contain patches for newly discovered security vulnerabilities.
  • Ensure that all business electronic devices are equipped with authentic and updated spyware and malware protection, including computers, tablets and cellular phones.
  • Never use any other devices to access business profiles, internet banking or websites where business or personal credit card details are required.
  • Prohibit the sharing of work electronic devices. This will reduce the risk of access to protected company information.
  • Ensure that all company devices are password protected. If these are stolen or lost, it offers a level of protection against unauthorised parties gaining access to the stored information.
  • As remote working becomes necessary, employees will likely be tempted to connect to free WiFi networks nearby. Public WiFi networks remain largely unsecure and by connecting to these platforms will lead to significant security risks.
  • Virtual Private Networks (VPNs) assist in encrypting internet traffic, this is more often implemented when a user is connected to a public Wi-Fi network. Ensure employees proactively, continuously and exclusively use a VPN when working and when accessing company information systems remotely.

Certificate in Cyber Security

Course Details

This practical, hands-on course focuses on establishing a foundation in Cyber Security by introducing candidates to cyber-crime, attack methods, and managing cyber risks.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for individuals embarking on a career in Cyber Security or performing security functions.

Requirements

Applicants should have a Matric certificate or equivalent qualification with suitable IT knowledge, Internet access, and a PC or laptop on which applications can be installed and services accessed.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

We have two main intakes, one at the end of February and another at the end of June. Additional intakes may be scheduled depending on application volumes and requirements.

Course Overview:
Cyber-crime‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to cyber-crime
  • Cyber-attack methods (e.g., ransomware, sextortion, email fraud)
  • Cyber criminology (actors behind the attacks, criminal networks, state-sponsored entities, etc.)
  • Tracing the online trail
  • Dark web (criminal forums)
  • Case studies of attacks in SA & Global.
  • Crime-as-a-Service
  • Internet of (Criminal) Things.
Practical Cryptography
  • Introduction to cryptography.
  • Encryption and Decryption.
  • Hash functions
  • Blockchain
  • Virtual Currencies
  • Digital signatures
  • Digital certificates
  • Cryptographic Protocols (SSL, SSH, etc.)
Course Overview:
Cyber Governance, Risk & Compliance
  • Overview of cyber governance, risk, and compliance
  • POPIA & GDPR
  • Data Privacy
  • Policies in action
  • NIST, ISO27001
  • Controls
  • Planning for contingencies
  • Developing the security program
  • Risk analysis and management
Cyber Intelligence‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to Cyber Intelligence
  • Attack Tools
  • Attack process
  • Reconnaissance and Footprinting
  • OSINT services and tools
  • Threat and vulnerability feeds and assessments

Cyber Investigations

Course Details

This course is suitable for investigators and investigation teams within the corporate environment and public sectors who are required to track online trails or utilise tools to solve online crimes. It is also intended for professionals and investigative journalists involved in investigations such as fraud, espionage, data theft, and cyber vetting.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for investigation officers, cyber-crime investigators, investigative journalists, etc.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Reconnaissance
  • Online services and tools
  • Metadata Encryption & Decryption
  • Digital signatures
  • Online investigations
  • Crime Scene Management
  • Documenting evidence
  • Investigation Process
  • Chain of Evidence
  • Protocols and emails
  • URLs & DNS information
  • Timelines
  • Decryption and deciphering
  • Virtual Currencies
  • Cyber criminology
  • Introduction to the attack process
  • Introduction to attack vectors
  • Social networks (i.e., attacks via Facebook, Twitter, etc.)
  • Dark and hidden web
  • Threat actors
  • Data Collection
  • Social Media
  • OSINT
  • HUMINT
  • SOCMINT

Cyber Intelligence

Course Details

The main objective is to equip delegates with the necessary competencies and practical skills to assist in compiling an intelligence-driven cyber security strategy to provide proactive solutions to a plethora of cyber threats.

Mode of Offering: The course is presented via facilitated        e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for persons responsible for the security function, CISOs, as well as Data Protection Officers.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Cyber Security Environment
  • Cyber Landscape
  • Cyber Threats and Exploits
  • Cyber Actors and Criminology Aspects
  • Obtaining Data
  • Sources of Data
  • Collection Operations
  • Applications, Tools, and Services
  • Analysis of Cybercriminals’ Modus Operandi
  • Analysis Techniques (Data to Information)
  • Indicators of Compromise
  • Cyber Intelligence
  • Intelligence Platforms, Applications, and Services
  • Data – Information – Intelligence
  • Intelligence Strategy
  • Incident Management
  • Cyber Warfare
  • Political and Commercial
  • Developing an Intelligence-Driven Strategy
  • Strategic and Tactical Intelligence Function
  • Risk Management

Cyber Governance

Course Details

Establishing a security strategy and defining a suitable implementation plan focused on managing cyber risks in a volatile and dynamic environment requires a solid understanding of the threat space and frameworks. This course unpacks cyber governance and approaches to manage risk and adhere to compliance regulations.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for Managers and C-Suites responsible for security, Board members, as well as prospective leaders in the Cyber Security space.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Security Management Program
  • Cyber-crime
  • Threat Environment
  • Cyber Criminology
  • Regulations – GDPR, POPI, Electronic Act, PCI-DSS
  • Skills Frameworks
  • Cyber Awareness Programs
  • Risk management
  • Controls – Choice, Implementation, and Management
  • Security Frameworks and Models
  • Policies and Procedures
  • Data Protection
  • The road to ISO 27001 Compliance and Certification

IT and Cyber Security Program

Course Details

Our courses combine essentials from both industry and academia to provide valid, unique, practical content that is innovatively presented via facilitated e-learning.

The IT and Cyber Security Program is a practical course consisting of coursework, virtual classes, and practical cyber range exercises.

Mode of Offering: Learning will be conducted through a facilitated online format, utilising an e-learning platform to provide an interactive and engaging educational experience. Additionally, hands-on practical sessions and virtual labs will be conducted every Friday from 9:00 AM to 12:00 PM, offering participants the opportunity to apply theoretical knowledge in a real-world context. This blend of online facilitated learning and scheduled virtual sessions aims to create a comprehensive and dynamic learning environment, ensuring a well-rounded educational experience for participants.

Intended Audience:

This course is designed for school leavers, those on a gap year, graduates looking to add industry credentials, and individuals looking to make a career change.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R 31,350 all inclusive

Duration:

10-months

Intake:

24 February 2024

Course Overview:
IT Foundation for Cyber Security
  • IT Hardware Fundamentals
  • Network Fundamentals
  • Introduction to Operating Systems (Windows and Linux) 
  • Introduction to Cloud Computing (Office 365 and MS Azure) 
  • Protocols 
  • Technical Research and Writing
  • Algorithms and Problem Solving
  • File and Database Systems
  • Scripting
  • New Technologies: AI and Quantum Computing
  • Soft Skills
Certificate in Cyber Security
  • Cyber Security Fundamentals 
  • The Cybercrime Eco-System
  • Actors in Cyber Space – State and Non-State Actors
  • Cyber Incidents: Attacks, Breaches, and Espionage
  • Understanding Tactics, Techniques, and Procedures (TTPs) using the Mitre Attack Framework
  • Cryptography (Symmetric/Asymmetric/Hashes)
  • Secure Protocols
  • Reconnaissance and OSINT (Open-Source Intelligence)
  • Cyber Security Frameworks and Standards: Introduction to the NIST CS Framework and ISO 27000 Series
  • Cyber Risk Management, Cyber Governance, and the Implementation of Security Controls
Facilitated online course with virtual classes, and practical training and skills development on the cyber range platform.