Security News (99 Posts)

1 2 3 4 5 ... Last - Previous >>

2019 CYBER SECURITY TRENDS REPORT OVERVIEW

In the past 6 months, ELYSIUMSECURITY has looked at 10 of the most popular Cyber Security reports of 2019 and created an overview document summarising their main trends and predictions.
The results will be presented at the next MU.SCL event (free registration HERE) but you can already have a look at the main findings by downloading the presentation in the DOWNLOAD section.

...
>>[READ MORE]

PHISHING PROTECTION FRAMEWORK

ELYSIUMSECURITY has designed a practical framework to help organisations implement an efficient Phishing Protection program.
Phishing has become the number one attack vector used by criminals to get around most companies defences and use social engineering to extract confidential information and conduct financial frauds.


For an efficient Phishing Protection program, organisations must consider not only implementing awareness and simulation campaigns but also integrate them to their phishing detection and protection strategy.


More information on how to implement this framework is available in our DOWNLOAD section.

...
>>[READ MORE]

NATIONAL CYBER SECURITY DRILL 2019

ELYSIUMSECURITY was asked to participate in the 2019 Mauritius National Cyber Drill where we presented on Incident Response in front of Mauritian organisations that are critical to the operation of the country. We took this opportunity to introduce the core concepts of the NIST SP 800-61 Incident Response framework.

We also provided a high level view of the ELYSIUMSECURITY Incident Response framework, which is a practical implementation of the NIST SP 800-61 Incident Response frameworkand the FIRST CSIRT services Framework

The updated presentation slides are available in our DOWNLOAD section...
>>[READ MORE]


HOW TO CHOOSE MICROSOFT 365 SECURITY PLANS AND ADD-ONS: E3, E5, EMS E3, EMS E5, 365 E3, 365 E5

Knowing what security features are included or not in the different packages offering from Microsoft can be confusing.
In this article, we will explain the overall principle of what all of those plans means.

For most companies, when it comes to Microsoft products you need protection for your EMAILS/DOCUMENTS/ENDPOINTS and for your ACCESS to Microsoft products (meaning AD, even if you are a Apple house)

The bottom line is that for ensuring you have the best security you want all or some of those security features:

  • Some advanced threat protection for your email/documents/endpoints:
    URL Link protection;
    Attachment protection;
    Identity and impersonation protection;
    Threat Intelligence;
    Alert for suspicious logins or activities;
    Logs and archiving;
    Advanced search and discovery;
    DLP
    Digital Right Management;
    Encryption;
    MDM (phones and laptops);
    GPO;
    Etc.

  • Some advanced threat p
  • ...
    >>[READ MORE]

    New Download section with Presentations

    A new section has been added to the Download page where you can now find a link to all the public presentations ELYSIUMSECURITY has been giving.
    Those presentations cover a wide range of Cyber Security topics and we hope you find them useful.
    They are classified as public and you are welcome to re-use them or part of their content, we just ask if you could please reference the source of this material if you do so.

    ...
    >>[READ MORE]

    FREE Cyber Security Event - 3rd Episode!

    Special guest announced for the next MU.SCL event!
    Dr Kaleem Usmani from CERT MU will be presenting on Incident Handling.
    You can register now HERE !

    This FREE to attend meeting will take place on the Thursday 26th of April 2018, from 6pm to 8pm, at the Flying Dodo Brewing Company in Bagatelle, Mauritius.

    We are working on a streaming option for those of you who cannot physically attend.

  • Talk1 - Social Media as a Cyber Weapon (Sylvain Martinez - ELYSIUMSECURITY)
  • Talk2 - Incident Handling in Organisations (Dr Kaleem Usmani - CERT MU)

    The first talk will present how information shared on social media platforms can easily be obtained and used against you. We will also take a look at recent world events and how this data can be aggregated and why this is dangerous.

    The second talk will discuss incident handling in t
  • ...
    >>[READ MORE]

    MU.SCL - Second Meeting for the Mauritius Cyber Security Club

    Following the success of last month event, ELYSIUMSECURITY is happy to confirm the second meeting for the Mauritius Cyber Security Club: MU.SCL
    This FREE to attend meeting will take place at the Flying Dodo Brewing Company in Bagatelle.

    In this second edition, the following two talks will be presented:

  • Talk1 - Introduction to ISO27001, GDPR, FFIEC
  • Talk2 - How to setup an IDS at home

  • The first talk will provide a high level overview of important Cyber Security regulations, standards and best practices relevant to most industries nowadays. At the end of the presentation, attendees should be able to take away key information and follow-up with any questions/worries/debate they may have on the subject.

    The second talk will be more technical and focus on how everyone can install an Intrusion Detection System in their home using Open Source software. This talk will hig...
    >>[READ MORE]

    MU.SCL - The Birth of a Cyber Security Club in Mauritius

    ElysiumSecurity is proud to announce the creation of a Cyber Security Club in Mauritius: MU.SCLE
    This Club has been created to help Mauritian IT Professionals to share information and learn about Cyber Security through an Open Platform and the creation of a Cyber Security Community.

    It is a free monthly event open to everyone , usually two talks of 45 minutes each with a mix of technical and non technical talks. Attendees will be able to ask questions, learn and apply practical knowledge as well as do some professional networking.

    The first event will take place on the 15th of February 2018, at 18:00 at the Flying Dodo in Bagatelle.
    Please REGISTER HERE so we can have an idea on how many people to expect.

    We hope to see you there, for what should be a fun, friendly and casual event whe...
    >>[READ MORE]


    FIRST Technical Colloquium 2017 in Mauritius - Our presentation on IDS

    ElysiumSecurity was invited by the Mauritian National Computer Security Incident Response Team (CERT-MU) to present at the FIRST Technical Colloquium 2017 which took place on the 30th of November 2017.
    We gave a presentation on how IDS can be used both as a traditional defensive tool and also a more original offensive tool.

    The aim of this presentation was to introduce the attendees of the various free and Open Source IDS offerings and to highlight the benefits and key components of a successful IDS implementation.
    It was also emphasised on how easy it is to get started with an IDS both from a software and hardware point of view.

    Below is a link to our presentation. If you want a more complete narrative please fee free to contact us for more information.
    We would like to thanks the Mauritian National Computer Board ...
    >>[READ MORE]


    Today's Cyber Security Risk Context

    In an attempt to make a wordy presentation slide into something more palatable, I created this infographic to illustrate the main contributing factors of the growing attack surface and attack vectors faced by many organisations today. This contributes to an overall growth of their Cyber Security Risks posture.



    ElysiumSecurity Ltd can help your organisation with assessing its attack surface and attack vectors to better understand its overall Cyber Security Risk posture and the remediation steps that should be prioritised.
    Contact us today for a free consultation at: consulting@elysiumsecurity.com

    ...
    >>[READ MORE]