SOWETO INVESTMENT CORPORATION (PTY) LTD
 
We offer real and permanent good to everyday people



BOLD_INNOVATIVE_INVENTIVE_VISIONARY

Total Cyber Security™


Cyber Security Overview

The lives of the African people, the vitality of African economies, and Africa's national security depend on a stable, safe, and strong cyberspace. Today, Africa relies on this vast array of networks to communicate and travel, power our homes, run our economy, and provide government services. Yet cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economies of Africa.

Securing the Cyber Ecosystem

We play a key role in securing Africa's cyber networks and helping to secure the broader cyber ecosystem through:

  • the provision of consulting and management advisory services to the owners and operators of critical infrastructure such as financial systems, chemical plants, and water, and electric utilities
  • the release of actionable cyber alerts
  • investigations of cyber criminals, and
  • education on how to stay safe online.

Combating cyber threats is a shared responsibility. The public, private, and non-profit sectors, and every level of government have an important role to play.

Responding Quickly to Cyber Vulnerabilities

By maintaining a team of skilled cybersecurity professionals and partnering with governments, we will be able to effectively respond to cyber incidents; provide technical assistance to owners and operators of critical infrastructure and disseminate timely and actionable notifications regarding current and potential security threats and vulnerabilities. By leveraging international resources we are integrally involved in Internet investigations concerning identity and document fraud, financial fraud, and smuggling.

We also operate programs that help educate and recruit future generations of cybersecurity workers and arm citizens with the information they need to protect themselves online.

Identifying Cyber Vulnerabilities

Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. As Africans become more reliant on modern technology, we also become more vulnerable to cyber attacks such as Corporate Security Breaches, Phishing, and Social Media Fraud. Cybersecurity is a shared responsibility, which must be made safer, more secure, and strong by all of us.

Collaborating to Enhance Cyber Security

To address the evolving threats and increased risks of cyber crimes, we work directly with public and private partners to enhance cybersecurity. We work to promote cybersecurity awareness and digital literacy amongst all Internet users. We also collaborate with the financial and other critical infrastructure sectors to improve network security. Additionally, we have special professionals dedicated to investigating cyber crime.

Combating Cyber Crime

We investigate local and international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. We provide law enforcement officers, prosecutors, and judges with cyber training and information to combat cyber crime. We identify sources for fraudulent identity, educational, and immigration documents on the Internet. 

We Implement Critical Security Controls, including

  • Critical Control 1: Inventory of Authorized and Unauthorized Devices
  • Critical Control 2: Inventory of Authorized and Unauthorized Software
  • Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  • Critical Control 4: Continuous Vulnerability Assessment and Remediation
  • Critical Control 5: Malware Defenses
  • Critical Control 6: Application Software Security
  • Critical Control 7: Wireless Device Control
  • Critical Control 8: Data Recovery Capability
  • Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps
  • Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  • Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services
  • Critical Control 12: Controlled Use of Administrative Privileges
  • Critical Control 13: Boundary Defense
  • Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs
  • Critical Control 15: Controlled Access Based on the Need to Know
  • Critical Control 16: Account Monitoring and Control
  • Critical Control 17: Data Loss Prevention
  • Critical Control 18: Incident Response and Management
  • Critical Control 19: Secure Network Engineering
  • Critical Control 20: Penetration Tests and Red Team Exercises

Products & Solutions

  • Data Center Security
  • Data Protection
  • Database Security
  • Web & Email Security
  • Identity & Access Management
  • Mobile Security
  • Network Security
  • Risk & Compliance
  • Security Management

 
Solutions

Security Information & Event Management

  • Business & Technology Solutions
  • Industry Solutions
  • Small & Medium Business Solutions
  • Embedded Security
  • Business Continuity
  • Disaster Recovery
  • Cloud
  • Visualization
  • Public Sector
  • Communication Service Providers
  • Healthcare
  • Financial Services


We Protect Systems & Networks against:

Attacks and Threats

  • Dealing with Cyberbullies
  • Identifying Hoaxes and Urban Legends
  • Preventing and Responding to Identity Theft
  • Recognizing and Avoiding Spyware
  • Recovering from Viruses, Worms, and Trojan Horses
  • Handling Destructive Malware
  • Understanding Denial-of-Service Attacks
  • Understanding Hidden Threats: Corrupted Software Files
  • Understanding Hidden Threats: Rootkits and Botnets
  • Recognizing Fake Antiviruses
  • Avoiding the Pitfalls of Online Trading
  • Avoiding Social Engineering and Phishing Attacks

Email and Communication

  • Reducing Spam
  • Staying Safe on Social Network Sites
  • Understanding Digital Signatures
  • Understanding Your Computer: Email Clients
  • Using Caution with Email Attachments
  • Using Instant Messaging and Chat Rooms Safely
  • Benefits of BCC
  • Benefits and Risks of Free Email Services

General Information

  • Guidelines for Publishing Information Online
  • Why is Cyber Security a Problem?
  • Understanding ISPs

General Security

  • Coordinating Virus and Spyware Defense
  • Debunking Some Common Myths
  • Good Security Habits
  • Keeping Children Safe Online
  • Real-World Warnings Keep You Safe Online
  • International Mobile Safety Tips
  • Safeguarding Your Data
  • Understanding Anti-Virus Software
  • Understanding Firewalls
  • Choosing and Protecting Passwords

Mobile Devices

  • Holiday Traveling with Personal Internet-Enabled Devices
  • Protecting Portable Devices: Data Security
  • Protecting Portable Devices: Physical Security
  • Securing Wireless Networks
  • Using Caution with USB Drives
  • Cybersecurity for Electronic Devices
  • Defending Cell Phones and PDAs against Attack

Privacy

  • Effectively Erasing Files
  • How Anonymous Are You?
  • Protecting Your Privacy
  • Supplementing Passwords
  • Understanding Encryption

Safe Browsing

  • Browsing Safely: Understanding Active Content and Cookies
  • Evaluating Your Web Browser's Security Settings
  • Shopping Safely Online
  • Understanding Bluetooth Technology
  • Understanding Your Computer: Web Browsers
  • Understanding Internationalized Domain Names
  • Avoiding Copyright Infringement
  • Understanding Web Site Certificates
  • Understanding Your Computer: Web Browsers

Software and Applications

  • Understanding Your Computer: Operating Systems
  • Reviewing End-User License Agreements
  • Risks of File-Sharing Technology
  • Understanding Patches
  • Understanding Voice over Internet Protocol (VoIP)

Best practices for computer security

Important: For information specific to the current CryptoLocker threat (Windows operating systems), see US-CERT's CryptoLocker Ransomware Infections or the CryptoLocker Security Bulletin from Protect IU.

This document details how you can secure your computer, accounts, and the data stored on them. Best Practices contains more technical security precautions that you should know, and that IT Professionals should implement. All information in this document applies to laptops, but for further details, contact us about Laptop Security.

Note: Following some of the suggestions below can affect how your computer interacts with the network. If your computer or local network is managed by a computer support provider, you should consult with your provider before making changes to avoid disrupting your network connection.


Top four things you can do to protect your computer

Use security software

  • The most important thing you can do to keep your computer safe is to install and maintain security software.

    Note: For personal computers, UITS recommends Windows Defender for Windows 8.x, which comes as part of Windows 8.x as a full antivirus suite. Be aware that the earlier version of Windows Defender on IUware is not the full suite, but a spyware program only. For Windows 7 and Vista, UITS recommends Microsoft Security Essentials, available free of charge via IUware. Be sure to have only one antivirus program installed.

  • Install and run Identity Finder, a tool to help you search for, protect, and dispose of personal information stored on your computer, file shares, or external media.

  • Install the Secunia Personal Software Inspector. This will alert you when your current software applications are out of date or require a security update.

Practice the principle of least privilege (PoLP)

Practice the principle of least privilege. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Simply visiting an unfamiliar Internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access. When you do need to perform tasks as an administrator, always follow secure procedures. 

cache/wst.opf.4401863.xml