Liquid Cyber Security, a Cassava Technologies Company, launched its first parent Cyber Security Fusion Centers in Johannesburg, South Africa.
The company aims to bolster the Cyber-Security sector in the country and Africa as a whole by curbing the growing menace of cyber-attacks on both the Government and various businesses.

What Liquid Cyber Security Fusion Centres Will Offer

This new initiative will prompt businesses and Governments in Africa to have access to Liquid’s array of Security Fusion centres in key sectors.

These Fusion centres will provide intelligence on cyber-attacks and bring in harmony with the existing Liquid cloud operation and operation centres which will ensure that the users have the full network, cloud, and Cybersecurity support that will safeguard the users with end-to-end security.

This newly launched centre will eliminate silos and improve the awareness of cyber-attacks which will lead to deeper collaboration between teams that will enable greater cyber resiliency. Due to some factors namely: security advisory, managed service, and integrated cyber intelligence, businesses will always stay ahead of cyber-attack.

In the 21st century, there has been rapid adoption of digital technologies and South Africa has followed suit, this means that there is a likelihood of cyber-attacks on various businesses and even governments.

In the latest report by Interpol, over 230 million cyber-attack threats were detected in South Africa alone in 2021, which shows that those operating on the dark side of this digital evolution have been granted more avenues to conduct cyber-attacks on various businesses through human error and brute force.

What They Are Saying About The Initiative

In a statement, the CEO of Liquid Cloud and Cyber Security, David Behr, said:
“Our pan-African Cyber Security Fusion Centers, when fully operational, will leverage our ability to track and predict threats across the continent and will be enhanced by the ability of our international partners such as Microsoft, ITC Secure, and Xcitium.

The alarming rate of cyber attacks prompted us to launch Liquid Cyber Security in 2020, and today we are elevating the offering for our customers by launching the first Fusion Center. As a result, we will ensure that our South African customers have access to leading solutions in the world, allowing them to mitigate potential threats promptly.

 

Read AlsoNew Kaspersky Report Alerts SMEs to Cyber Threats

 

Most importantly, clients can focus on their critical business needs while we manage their cybersecurity requirements 24/7/365 with the most cost-effective and effective approach”.
The company has partnered with Microsoft which will ensure that South African businesses have access to security services from Microsoft Defender and Microsoft Sentinel with both providing round-the-clock cyber-security.

For smaller businesses who may not be able to afford the fees required to access Cybersecurity from Microsoft, they have partnered with Xcitium (formerly Comodo Security Solutions) to aid businesses that require Security Operations Center (SOC) without investing high-skilled resources that are affordable.

More On What The Newly launched Fusion Centre Will Offer

This Newly launched fusion centre aims to counter threats with strategic and intelligent approaches which enables the team to make informed decisions for their users while protecting them from Cyber-attacks. The launch has also proven the organization’s commitment to providing world-class security to local businesses.

In a statement, CEO, David Behr, said:”One of the most significant benefits of Liquid Cyber Security Fusion Center is the improvement in the time it would take for the organization to detect and respond to threats faster and more intelligently.

As a result, Liquid is now able to help its customers in real-time- and enable them to be proactive rather than reactive, as well as manage the situation effectively, especially in today’s complex threat landscape”.

 

Ways To Protect Your Organization in The Cyber Security

Cybercrime when successfully inflicted on a business or an organization can cause major damages and harm to such business, hence you have to make sure that your online presence must be very secure.

So here are processes that can be used to protect your organization in cyberspace:

1) Secure your database and network:
To secure your network, you will have to use two processes namely:
i) Setting up firewalls
ii) Encrypting information.
Encrypting and setting up firewalls, will help to reduce the risk of cyber criminals gaining unauthorized access to the network and accessing sensitive information.

Your Wi-Fi network is hidden and makes sure your password is protected from the public, having a database doesn’t mean that all your information should be stored there for security reasons but if you should have all of your information stored in a database there must be automatic backup which will ensure that in the case the server is infiltrated it can be recovered later on.

2) Create awareness among your employees:
If you as the owner are educated about the protection of the Cyber-space, you will also need to ensure that your employees aren’t ignorant of the cyber-space and set policies that will in detail explain to your employees what are and aren’t accepted at your organization.

As an employer, not all your employees are expected to have administrative access to curb the risk of being hacked by cybercriminals.

3) Create security policies and practices:
Set up policies that will help to protect your organization from cyber-security and set up guidelines to resolve the issues if they arise.

Ensure to control the access unauthorized personnel have to your organization’s computers to prevent them from unknowingly or knowingly granting cyber criminals access to them.

Also, ensure that when a computer is faulty or is abandoned reset them back to the factory setting so that it will be useless when it falls into the hands of a cyber-criminal.

4) Sensitize your customers:
Most cybercriminals now target customers of these organizations while disguising themselves as an employee of the organization to obtain sensitive information such as their social security number and their bank account details. Ensure to sensitize your customers that the company will not require such sensitive information from them and tell them to report any suspicious message to the company.

Conclusion
Cyber security is becoming one of the key areas a company is expected to focus on if they are diving into the tech sector and companies like Liquid Cyber Security are committed to ensuring that such companies aren’t prone to hackers by providing them with 24/7 top-notch security.