Soteria Cloud Total Data Protection – Website Relaunch

Soteria Launches Total Data Protection With all New Website

Total data protection is becoming essential at a time when cyber-attacks are increasing exponentially, covering every aspect of data protection, from backups to privacy protocols.

With 2 200 cyberattacks reported per day worldwide in 2023 and more than 150 data breach notifications received per month in 2024, according to Information Regulator chairperson advocate Pansy Tlakula, internet users are realising that data security is no longer a distant risk, but rather something that every business and individual needs to consider.

To ensure total peace of mind, total data protection (TDP) is a great option for any business that takes its cybersecurity seriously.

Let’s take a look at this innovative system to find out how it can benefit your business.

Why is TDP necessary?

South Africa is grappling with a major cybersecurity crisis, as well-known companies and government departments fall prey to the tactics of online criminals on an almost daily basis.

Recent cyber-attacks affecting major banks, the Department of SA Social Security Agency, and the massive TransUnion hack in 2022 which exposed millions of credit records, are just some of the events that have seen cybercriminals outsmart cybersecurity experts at some of the country’s largest organisations.

The main takeaway from these events is that attacks will happen, and companies need to prepare for this eventuality.

One of the best ways to recover from a cyber-attack is to have a full backup of every piece of data that could be of interest to cybercriminals, so they can’t hold it over your company’s head, demanding ransom.

Total data protection helps to both prevent these attacks and recover from them. It offers a holistic approach to cybersecurity, covering the following aspects:

Fixed cost per device (no additional storage or licence fees)

To help businesses keep their costs under control while ensuring the best possible data protection, a single cost per device is typically charged for TDP. This avoids additional fees for high amounts of storage used and eliminates licensing fees for proprietary software.

Uncapped backup storage

The amount of data that can accumulate in the cloud account of a large corporation can be astounding. With uncapped backup, your business can afford to keep all its important data safely and securely encrypted in the cloud without having to worry about increasing overheads.

Entire machine application-aware backup

This type of backup ensures that every bit of data produced by the device is securely stored, with specific storage being available for designated applications. System administrators define which applications’ data will be backed up and when.

5-year data retention (7 days, 4 weeks, 60 months)

Companies that back up their data for short periods of time, like a year or less, find themselves in a dire situation if a cyber-attack compromises data that was created before the last available backup.

Total data protection features comprehensive backup for the past five years, allowing every file produced during that time to be accessed securely in the event of a cyber-attack or data loss.

Advanced Security and Advanced Management Add-On Packs

These advanced software packages allow system administrators to implement additional layers of security as needed and manage the data that is securely backed up remotely. This enables companies to fine-tune their backup strategy and ensure that files are available in the cloud, no matter what eventuality may arise.

Ready to implement a total data protection plan?

Soteria Cloud is proud to introduce Total Data Protection as our new flagship product. If you’re ready to take the next step and protect your business from the increasing risk of cybercrime, visit our TDP product page today to learn more.

Stay Safe, Avoid Scams – Black Friday

Black Friday 2024 – How to Avoid Scams & Stay Safe online

The end of November has become synonymous with Black Friday, the day when Christmas comes early, and consumers can look forward to huge savings on their favourite products.

Unfortunately, the last Friday of the month is also a day when cybercriminals like to celebrate the takings from their latest financial scams. Against the backdrop of increasing fraud cases across the country, this Black Friday is a day not only to enjoy some serious savings but also to take online safety seriously.

Here are some of the common scams that cybercriminals may try to execute on the day and the weeks leading up to it, and how you can avoid them.

If it’s too cheap to be true, it probably is

Black Friday is all about saving money, and the psychology of getting a good deal is so appealing to many consumers that cybercriminals are able to exploit it to make their scams believable.

Usually, receiving an email or social media message about a product that’s 50% or more off its normal price would raise some eyebrows. But with the generous discounts offered around Black Friday, consumers often let their guard down and fall for non-delivery scams on items that are so cheap, it’s almost unbelievable.

  • This type of scam generally works by offering the customer an expensive product at 20% to 30% of its price.
  • Following payment, the seller will typically disappear and never make delivery. Alternatively, they may deliver inferior or fake goods, an empty box, or some other type of fraudulent package.

It’s easy to avoid this scam by only dealing with reputable retailers, but even this is becoming more challenging in a time when fake websites are proliferating.

Double-check retail websites to avoid losing money

Impersonation scams have reached a whole new level with entire brands and websites being duplicated by cybercriminals.

In our article on domain name scams, we touched on the importance of verifying that the website you’re dealing with is the real deal. This is especially important for customers dealing with retailers in the weeks leading up to Black Friday.

  1. Before you place an online order, it’s essential to ensure that the website you’re dealing with is genuine.
  2. Googling the site and comparing the URL that comes up first in the search results with the one you’re currently browsing is one way of doing this.
  3. If your favourite retailer offers a shopping app, it’s always safer to transact using that, rather than risk visiting a fake URL.

Beware of fake vouchers and discount codes

Another tactic cybercriminals are employing to fool unsuspecting consumers is offering Black Friday vouchers for sale which turn out to be fraudulent and unusable.

  • Generally speaking, retailers will never offer to sell you vouchers other than official retail gift cards.
  • The moment you receive an offer to pay R100 for R200 off, or a similar deal, your suspicions should be heightened.

When in doubt, the best rule of thumb is to purchase directly from your favourite retailer’s website, use the app, or even do it the old-fashioned way by going there in person on the day.

Keep your personal data safe with us on Black Friday and beyond

With fraud cases rising by 45% in South Africa, 2024 is the year to prioritise online safety.

Our comprehensive range of secure cloud storage solutions for businesses and households will help ensure that your data is kept securely in the cloud in encrypted form.

Domain Name Scams – Cybercrime

How to Avoid Domain Name Scams

Millions of consumers visit their favourite retail websites or online banking portals regularly to enjoy the convenience of instant shopping or financial transactions.

Unfortunately, the very sites that we visit and trust with our private information, including banking details, could very easily be fake.

Domain name scams are becoming increasingly popular around the world as cybercriminals take impersonation to the next level, building virtual replicas of well-known websites.

As this phenomenon spreads in South Africa, local internet users will need to be extra vigilant when shopping and banking online.

How cybercriminals impersonate entire websites

The modus operandi that cybercriminals tend to follow when carrying out these scams is both simple and deceptive.

First, fraudsters register a domain that closely resembles the real domain, making it sound plausible. Some hypothetical examples of these sites could be absabankingsite.co.za or amazononlineshop.co.za.

For someone who isn’t familiar with the company’s real URL, these websites seem legitimate enough because they have been designed to look identical to the real thing.

  • Once unsuspecting customers land on these websites—which can be promoted through fraudulent social media, email or WhatsApp spam—they are typically prompted to log in using the actual credentials they use for online banking or shopping.
  • Once this is done, the cybercriminals have access to their login details, which can then be used to gain access to their accounts and carry out various fraudulent acts.

Domain name scams can be very convincing, but there are ways to avoid them when banking and shopping online.

How to stay safe in the age of fake websites

As an internet user, you have reason to be concerned about these advanced impersonation scams, which now include entire website replicas.

  • The only way to be certain that the website you’re using is authentic is to confirm that it is, in fact, the official website of the company you’re dealing with. This can be verified with a Google search.
  • It’s also important to note that most companies will never ask you to supply your login credentials by email or any other form of communication. Any correspondence you receive asking for this is likely to be suspicious.

When logging into internet banking or retail shopping websites, we recommend that internet users always opt for multi-factor authentication.

For banking, downloading your bank’s official online banking app is much safer than relying on the website, which may or may not be genuine.

Protect your vital data with secure cloud storage

With online activity at an all-time high, businesses and households alike can never be too careful when it comes to protecting private data.

Soteria’s range of secure cloud storage packages for households and businesses is the ideal way to keep your sensitive files safe in the cloud and out of the wrong hands. Visit our product page today to learn more.

Healthcare Industry – Cybersecurity Hygiene

Poor Cybersecurity Hygiene Puts Healthcare Industry in Critical Condition

Hospitals and medical providers are on high alert after a devastating cyber-attack brought National Laboratory Services to a standstill, potentially endangering patients’ lives and exposing their private data to criminal elements.

As the healthcare industry joins a long list of sectors currently targeted by cybercriminals, medical firms are looking to strengthen their defences against online attacks. In this article, we examine the current cybercrime landscape in the healthcare industry and how the concept of cybersecurity hygiene can help protect vulnerable organisations.

National Laboratory Services hit by a major cyberattack

Cybercriminals made headlines once again last month when they carried out a ransomware attack against National Laboratory Services, one of the largest providers of pathology services to public hospitals.

  • The laboratory network, responsible for testing blood and other human tissue samples for the medical profession, came to a standstill as its systems were offline for a period of weeks.
  • An estimated 6 million test results were rendered unavailable by the attack, delaying operations and chronic illness treatments nationwide.
  • Medical information, particularly urgent test results that could influence treatment outcomes, has become fair game for cybercriminals, who show no mercy when it comes to the type of information they’re willing to hold hostage.

In the wake of the attack, medical providers and hospitals across the country are scrambling to enhance their cybersecurity measures.

Fortunately, the concept of cybersecurity hygiene, which should resonate with the healthcare industry, is one of the most effective ways to achieve higher levels of data protection.

Ensure a healthy network with cybersecurity hygiene

To safeguard data at a time when cyberattacks are increasing daily, a reliable set of preventative measures is required. Much like the hygiene practices commonplace in hospitals and doctors’ offices, these procedures can result in fewer malware infections, ransomware incidents, and hacking attempts if implemented conscientiously.

  • Limit access to critical data: Password-protected files with multi-factor authentication should be standard in every hospital and medical practice today. This not only protects patient privacy but also keeps sensitive files out of the wrong hands.
  • Invest in cybersecurity defences: Examples of these include updated firewalls and the latest antivirus software. Additionally, secure cloud storage and automated backups featuring encryption technology provide significant layers of protection for your data.
  • Train staff to recognise cyberattacks: With many cyberattacks occurring through social engineering staff need to be trained to identify suspicious emails and communications, and to never disclose sensitive information to third parties.

Maintain a healthy information system with us

Avoiding a cyberattack and practising cybersecurity hygiene is possible with the latest generation of secure cloud storage. Our range of packages for businesses of all sizes is the ideal starting point for securing your data. Visit our product page to learn more.

Weak Passwords – Cybersecurity

Too Easy, Too Weak: Password Patterns Still Concerning

Weak password security is one of the main contributing factors to the current wave of cybercrimes sweeping the world. Despite repeated warnings from industry experts to choose more complex passwords, many users still fail to follow this advice.

Recent research shows that internet users continue to opt for passwords that are easy to guess or crack, leaving the door wide open to cyberattacks. Let’s take a closer look at this phenomenon and find out what organisations can do to strengthen their security.

Why are we still using simple passwords?

For many years, cybersecurity experts have been sounding the alarm about simplistic passwords that are far too easy to guess. Passwords like “12345”, variations on the word “password”, or even the user’s own name are still frequently chosen, despite the widely publicised dangers of doing so.

In fact, 2023 saw South Africans choose the password “admin” most frequently of all.

While some experts blame users for being lax or unoriginal, there is a possible psychological explanation for the simple passwords we choose: we believe that if we came up with them, they must be unique and impossible to guess.

This human tendency to overestimate our own ability at certain tasks is known as the Dunning-Kruger effect, a well-documented psychological phenomenon.

This effect applies to everything from our perceived ability to drive at high speeds, our competence at work, and even our attractiveness or social skills. Password creation is yet another area where we often think we are better than we really are.

Best practices for password creation

Unfortunately, cybercriminals are much better at guessing or decoding our passwords than we are at creating them.

To avoid this and secure crucial business data, team members in every organisation should be trained to apply best practices for password creation, which include:

  • Using a password length of at least eight characters: Longer passwords are harder to guess and cannot be easily cracked by automated password-cracking software.
  • Including numerals and special characters: This adds complexity to passwords, making them far less likely to be compromised.
  • Avoiding personal information: Don’t choose words related to your daily life, such as hobbies, interests, or your workplace. Cybercriminals carrying out social engineering attacks may have already researched these aspects of your life and could use them to crack your password.

Password security and secure cloud storage – key aspects of every cyber defence strategy

A strong password adds an extra layer of security to your data, especially as cyberattacks and ransomware incidents become more frequent, costing businesses millions of rand each week.

In addition to strong passwords, secure cloud storage featuring encryption technology has become a non-negotiable element of every effective cybersecurity strategy.

To learn more about these technologies and how they can benefit your company’s online security, visit our product page today.

Free VPN – Cyber Risk

Beware the Cyber Risks of Using a Free VPN

VPN (virtual private network) services are extremely common in this age of privacy concerns, offering a quick and easy way for internet users to avoid tracking and geographic profiling when they access online services.

Unfortunately, free VPNs come with a host of potential security risks and could even make your internet browsing less secure than it was before you started using them.

Here are some of the threats that come with free VPNs and how you can avoid them.

Nothing for Nothing: You May Be Paying for Your Free VPN with Your Private Information

Whoever said that the best things in life are free clearly wasn’t an expert on cybersecurity. In the realm of VPN providers, there’s a direct correlation between the cost of service and the safety of use.

While free VPNs may seem like a good idea, web users should always ask themselves: if it’s free, how does the company make money?

  • In most cases, free VPN providers generate their income from selling access to your time, attention, and sometimes even your data
  • Free VPN services tend to bombard your browser with ads, giving advertisers full access to you as a captive audience while you use the service
  • Some of these ads may be suspicious in nature, with malware waiting to infect your device once you click on them.

Worryingly, some free VPNs may even sell your private data or internet browsing information to third parties or allow hackers to hijack your device. Recently. researchers found 28 free VPN apps on Google Play that had links to cybercrime networks.

Given that these providers are almost always located outside of the country, any form of legal recourse you may seek against them could be highly difficult, if not impossible, if your private information is compromised.

Why It’s Worth Investing in a Paid VPN

Like most things in the market, premium VPNs, which require a purchase or subscription fee, are more likely to offer safe and effective services.

  • By opting for a paid VPN, you can rest easy knowing that you won’t be bombarded with unwanted ads and that the company has no incentive to sell your data to third parties
  • In fact, they have every reason to keep your data safe by investing in advanced cybersecurity for users of their service

Paid VPNs bring several benefits, primarily privacy when browsing online, and can be an integral part of a comprehensive cybersecurity strategy for individuals and companies alike.

Boost Your Data Security

To further boost data security, we recommend browsing our range of secure cloud storage packages for households and businesses of all sizes. As we said earlier, nothing good comes for free but our lineup of automated backup solutions offers an affordable monthly storage option that’s ideal for any organisation.

Biometric Authentication – Secure Cloud Storage

Is the ‘liveness’ of biometric authentication the way forward?

With smart payments becoming the norm throughout South Africa, a new type of financial convenience is upon us, along with an increased risk of cybercrime and fraud.

Tap-to-pay services, including Apple Pay, Samsung Pay, and proprietary banking apps that link smart devices with customers’ credit cards, have come to make up a large chunk of total transactions, especially for income earners.

As this trend continues, it’s important to consider the security measures that need to be in place to avoid a surge in online fraud.

Let’s take a look at contactless payments and the biometric identification systems being developed to keep customers safe.

Enjoying tap-to-pay. Preventing tap-to-steal

If you’ve noticed tap-to-pay terminals at your favourite shop recently, you’ve already witnessed one of the biggest trends sweeping banking across the country.

Contactless payments, made possible by the NFC technology found in modern smartphones, mean you no longer have to swipe or insert your card. You can simply tap your credit card or an enabled device linked to your account and pay within seconds.

Standard Bank appears to be leading the way in this regard, with more than 50% of transactions at the bank currently taking place through contactless means. A similar upward trend has been reported by Absa and Nedbank, though not to the same extent.

The convenience that contactless payments bring is easy to anticipate; customers no longer need to enter PINs or swipe cards, as they can use biometrics on smartphones to ensure that the transactions taking place are genuinely theirs.

Unfortunately, like many verification technologies, biometrics have already been faked by cybercriminals.

Is that really your face? False facial images can deceive Face ID

Just when you thought cybercriminals couldn’t get any smarter, some of them have figured out how to reproduce a human face to such an accurate degree that Face ID and similar verification systems can be fooled.

  • In response to this threat, secure banking apps and other login credential verification systems are now requiring liveness verification, which can detect whether the face being used for identification belongs to a living, breathing human and matches the credentials for that specific account.
  • If you’ve tried to verify your online banking app recently, you may have experienced this process firsthand.
  • Multi-factor identification, including passwords, digital device tokens, and other methods to ensure that the account holder is logging in, have become the norm across the banking industry.

But while banking apps secure their login credentials, cybercriminals remain on the lookout for easy targets – including your sensitive business documents and client information.

Secure your data in the age of easy money flows

Keeping your company’s valuable data safe from online criminals has never been more important, and secure cloud storage is one of the best ways to ensure this. Soteria’s broad range of cloud storage packages is ideal for businesses of all sizes.Visit our website today to learn more.

Manufacturing Cyber-readiness – Cybersecurity

Why Manufacturers Need to Boost their Cybersecurity 

Manufacturers are feeling the heat of online attacks, and the industry needs to match its reputation for operational efficiency with cyber-readiness.

Until recently, most headlines concerning cyberattacks tended to focus on the financial industry, either because banks themselves were being targeted by cybercriminals or because of the proliferation of phishing scams victimising individual and business banking clients.

Recently, however, the manufacturing industry has found itself in the crosshairs of hackers and cybercriminals, with many manufacturers being unprepared for the disruptive effects of ransomware attacks and data leaks.

Here’s a look at the growing online security crisis facing manufacturers and what can be done to strengthen cybersecurity defences at the factory level.

Safe No More: Manufacturers Feel the Sting of Cyberattacks

Traditionally, manufacturing companies had considered themselves low-risk when it came to cyberattacks. Unfortunately, the Internet of Things (IoT) has brought a stop to this sense of security.

While factories used to focus on physical security and inventory management far more than online defences, modern manufacturing setups, which feature production lines managed by robots and are one hundred per cent connected to the internet, can present a major vulnerability that cybercriminals will be only too happy to exploit.

The results of a cyberattack focused on a manufacturing company can have devastating effects on the company itself and the whole supply chain. These include:

  • Severe downtime as a cyberattack cripples factory equipment linked to the Internet of Things (IoT). Pending payment of ransom or attempts to reboot the network from scratch, manufacturers may be forced to halt production.
  • Manufacturing companies that produce critical components in the supply chains of other companies may not consider themselves major targets for cyberattacks. However, even if a small component of a product like a smartphone or a top vehicle model becomes unavailable, production of that product may need to cease as well.

In light of these facts, it’s easy to imagine the chain of production stoppages arising from a single cyberattack cascading and creating severe losses for every business involved in the manufacturing of a product.

Suppliers may face the risk of having their agreements with the parent company reviewed and could even find themselves in legal difficulties if they fail to deliver on their contractual obligations.

The Manufacturing Industry Needs to Be on Guard 

As manufacturers realise they are no longer safe from the malevolent plans of cybercriminals, every business in this industry needs to ensure that its cyber defences are strengthened and ready.

Using immutable, encrypted online storage is an excellent first step for any business seeking to improve its cyber defences.

Soteria Cloud provides a range of cloud storage options that are perfect for companies of all sizes. Visit our product page today to learn more.

Cloud Storage Costs – Online Backup

Breaking Down Cloud Storage Costs for SMBs and Entrepreneurs 

As a small business owner, security will be high on your list of priorities. Ensure that you have access to the best encrypted cloud storage to keep your data safe without incurring unnecessary expenses. It’s essential to understand the structure of cloud storage pricing and plan your expenditures accordingly.

Let’s take a look at the various pricing options available in the cloud storage industry, as well as the benefits and security enhancements that come with each one.

Cloud Storage: A Crucial Expense

Generally speaking, every business’s expenses can be classified into essential and nice-to-have categories. With the risk of cyber attacks increasing each year, secure cloud storage is definitely in the essential category.

How Much Does a Standard Cloud Storage Setup Cost?

Secure cloud storage allows your important files and documents to be kept safe in the cloud using advanced encryption methods that make it extremely difficult, if not impossible, for cyber criminals to access your data even if it becomes compromised.

In exchange for the peace of mind and security it offers, secure cloud storage is relatively inexpensive.

Let’s take a look at some of Soteria’s cloud storage packages for businesses (September 2024) as an example.

  • A small business may simply want a 20Gb storage package at the reasonable price of R99 – the equivalent of a few coffees to go.
  • Doubling this storage quota to 40Gb will cost just R160 – a significant saving per Gb. 
  • A business with data-intensive processes and large storage requirements would still only need 100 – 500gb of monthly storage, ranging from R249 to R999 in pricing. 

How to keep your cloud storage cost effective

Since cloud storage packages are usually quoted per Gb or Tb, the ideal approach is to back up your essential files and avoid filling up your storage quota with redundant files. This will also reduce the amount of internet bandwidth you use to upload and backup your files.

  • Clear out your storage regularly. Carrying out a digital spring cleaning is one of the best ways to eliminate files that are occupying space in your storage. 
  • Compress then upload. Smaller file sizes mean smaller data quotas in your online storage. 
  • Track your usage. Keeping an eye on your storage quota will help you avoid unnecessary charges. 

To help your business gain the benefits of enhanced data security, we invite you to visit our product page today and discover a package that suits your organization’s needs. 

Rebuilding Trust – Cybersecurity

Rebuilding Trust after a Cyberattack – Not If but When

Trust is key in all business dealings, but an increasing number of consumers report plummeting trust levels in commercial entities, especially large ones.

In a business landscape that’s becoming less trusting, a #cyberattack can be the final blow that causes customers to take their business elsewhere. Here are some ways to build and maintain trust in your company even if an online security incident takes place.

The three keys to maintaining trust online

There’s no doubt that the internet is becoming increasingly risky, with cyberattacks increasing by the year. Despite advances in antivirus software and efforts to reduce the number of cyberattacks, the prospect of your business losing crucial customer data to cybercriminals is an ever growing reality.

By taking all necessary steps to prevent a cyberattack, responding swiftly and effectively in the event that one takes place, and maintaining a high level of sincere communication with your clients in good times and bad, you can ensure that your business remains a trusted entity for years to come. 

Let’s take a look at each of these components in detail.

1. Make cybersecurity a priority and make sure your customers know about it

Covering the basics of antivirus, firewalls, anti-malware, and of course, secure cloud storage is always the first step toward building your cyber defences. 

This may give you confidence in your company’s data security, but it will do little to inspire confidence in your customers – unless they know about it.

Without revealing specific details of your cybersecurity activities, which could give cybercriminals hints about potential vulnerabilities, it’s good to let your clients know that you take cybersecurity seriously and are taking measures to protect their data.

2. Act Decisively in the Event of a Cyber Attack

The worst-case scenario for any business is a large-scale data leak or cyber attack, and yet many companies will find themselves in this exact situation over the next decade, if not sooner.

  • If your business has become the victim of a cyber attack, the first step is to limit the damage as much as possible by relying on the latest version of your crucial files, which should always be kept securely encrypted in the cloud.
  • Directly following the attack, you should make a concerted effort to communicate the situation to your clients and reassure them about the steps you’ll be taking.

3. Communicating for Success Even in a Cybersecurity Failure

The way you communicate with your clients in the hours and days following a cyber attack or data leak could make the difference between a customer who stays with you and one who decides to cut ties.

  • Inform them honestly about the situation; there’s no use hiding the fact that the data leak or breach has occurred, and if you do, you could not only lose the trust of your customers but also find yourself in violation of the PPI Act.
  • Outline your cybersecurity response plan. Let your customers know what steps you have taken to retrieve their data, as well as precisely what type of data has been compromised—ID numbers, contact details, and more sensitive information like passwords.
  • Re-emphasise your commitment to cybersecurity now. Your client may have experienced a cyber leak or breach from another supplier and will be looking for signs that you are constantly upgrading your cyber security. 

By outlining the steps your organisation is taking to improve data protection, you are more likely to inspire confidence in your clients and retain more of them in the wake of a cyber attack which could have a massive financial impact on your business.

No matter what strategy you employ to protect your confidential data, secure cloud storage will always end up being a pivotal part of it. To find a cloud storage package that suits your needs perfectly, check out our product page today.