010 001 2960 [email protected]

WE’RE HIRING

AnonIT is lookig for a Junior IT Technician & Administrator to join the team at our Head Office in Gauteng.

We’re looking for an individual with an interest and aptitude for working with computers and technology. The position includes some administrative functions but training will be provided.

Key Responsibilities
Your day-to-day duties will include (but not be limited to) the following:
• Managing and monitoring IT systems and infrastructure
• Assisting with installing new and existing PCs/laptops and configuring equipment such as printers
• Monitoring IT systems, networks, workstations and printers
• Engaging with agents on various aspects of a project.
• Learning about and working with industrial machinery and other technology.

Skills & Attributes
• Proficient in the Microsoft Suite of Programs, particularly Excel.
• Excellent communication skills, both written and verbal.
• Critical thinking, problem-solving and time management skills.
• Ability and passion for learning new skills and technologies.
• Ability to produce work of a high standard.
• Energetic, enthusiastic and able to deal with pressure.

Education & Requirements
• Knowledge of IT/Networking
• A valid driver’s license and own, reliable transport.

This is an opportunity to join a well-established and growing business.

If you meet the requirements and have a hardworking attitude,
we’d like to hear from you.

Please email your CV to [email protected]

RSAWEB – RANSOMWARE ATTACK!

RSAWeb Network Down Due to Ransomware Attack

RSAWeb, a South African IT service provider, suffered a ransomware attack on February 1, 2023, resulting in a network outage. The attack, which was deemed “highly sophisticated,” impacted the company’s cloud and shared hosting customers. In a letter sent to clients, RSAWeb CEO Rudy van Staden confirmed that the attack was part of a larger campaign targeting businesses globally and that the relevant authorities have been notified.

Van Staden stated that the recovery process was complex due to the sophistication of the attack, but they were working around the clock to restore services to the majority of customers within 24 hours. Most of their Fibre to the Home (FTTH) and Fibre to the Business (FTTB) services have already been restored. The CEO assured clients that no customer or employee data was accessed or misused during the attack.

The cause of the attack is speculated to be the widespread attack on VMware ESXi servers, also known as the ESXiArgs ransomware campaign. RSAWeb has yet to confirm the type of attack it experienced.

Read Full Article – MYBROADBAND

What is Two-Factor Authentication?

Two-Factor Authentication: An Extra Layer of Security for Your Social Accounts

In today’s digital age, social media has become an integral part of our daily lives. It’s where we connect with friends and family, share our thoughts, and even do business. With so much of our personal information on the line, it’s crucial to ensure that our social media accounts are secure. That’s where two-factor authentication (2FA) comes in.

What is Two-Factor Authentication?
Two-factor authentication is an extra layer of security that requires you to provide two forms of identification when logging into your social media account. The first step is your username and password, and the second step is a unique code sent to your phone or email. Only after entering both forms of identification can you access your account.

Why is Two-Factor Authentication Beneficial?
Protects against hackers: By adding an extra step to the login process, 2FA makes it much harder for hackers to gain access to your account, even if they have your password.

Prevents unauthorized access: If your password is stolen or guessed, 2FA ensures that your account remains secure, as the hacker won’t be able to access it without the second form of identification.

Keeps your information safe: Social media accounts often contain sensitive information, such as personal photos, financial information, and contact details. With 2FA in place, you can rest assured that your information is protected.

Why is Two-Factor Authentication Recommended?
It’s easy to set up: Most social media platforms offer 2FA as an option, and it’s simple to activate.

It’s free: Unlike other forms of online security, 2FA is often free and doesn’t require any special software or hardware.

It’s becoming the standard: With more and more companies adopting 2FA, it’s becoming the norm for online security. By using 2FA, you’re staying ahead of the curve and keeping your account secure.

In conclusion, two-factor authentication is a simple and effective way to protect your social media accounts from hackers and unauthorized access. It’s recommended that all users enable 2FA to keep their information safe and secure.

Impressive Ticket Resolution ’22

Impressive Ticket Resolution and Dedicated Customer Service
AnonIT Solutions has had an incredible year in 2022, with a total of 4551 tickets received and an impressive 3473 of them successfully resolved. Our team has truly gone above and beyond in providing top-notch service to our valued customers.

One of the busiest months for our team was July, with a staggering 575 tickets to handle. But our team rose to the occasion, working tirelessly to resolve each and every one of them. This kind of dedication and hard work is what sets us apart from the rest and is a testament to the level of service we provide.

But the month that truly stands out is February, where our team hit their peak in terms of ticket resolution. An astounding 401 tickets were resolved during that month, making it a record-breaking month for AnonIT Solutions. This achievement is a reflection of the expertise and skill of our team, and we couldn’t be more proud of them.

Overall, 2022 has been a remarkable year for AnonIT Solutions. Our team has worked tirelessly to provide the best service possible, and their hard work and dedication have paid off. We are excited to continue delivering top-notch service in the coming year and to help our customers with all their IT needs.

We are proud of our team and the level of service they provide to our customers. We understand that IT issues can be a real headache and our team is dedicated to resolving them as quickly and efficiently as possible. We are available 24/7 to help you with any IT related issues that you may have. Our team is highly skilled and experienced and can handle any issue, big or small.

AnonIT Solutions is dedicated to providing the best service possible. We strive to be the best in the industry and to be a company that our customers can rely on. We understand the importance of IT in today’s business world and we are committed to helping our customers to stay up and running. We are proud of the service we provide and we are excited to continue to help our customers in the future.

Cyber Security & AnonIT

Cybercrime
is a constant threat that businesses have to be aware of and take steps to protect themselves from. One of the most prevalent forms of cybercrime is phishing. Phishing is a type of cyberattack that uses fraudulent emails or websites to trick individuals into providing sensitive information such as login credentials, credit card numbers, and other personal information. The increasing sophistication of phishing attacks and the ease of execution make it a significant threat that is not likely to go away anytime soon. To help businesses protect themselves, ANON IT Solutions offers a range of services to address this problem.

Fully Managed IT Support
ANON IT Solutions provides fully managed IT support services that help businesses protect themselves from phishing attacks. Our team of experts stays current with the latest advancements in the industry to provide you with the best solutions for your specific needs. We provide ongoing support and expertise to ensure that your solutions and services are successfully implemented and managed.

IT Governance
ANON IT Solutions offers IT governance services that help businesses protect themselves from phishing attacks. Our team of experts can help you develop and implement policies and procedures that align with your specific needs and budget. We work with you to ensure that your IT infrastructure is secure and that your sensitive information is protected.

Cloud Managed Solutions
ANON IT Solutions offers cloud managed solutions that help businesses protect themselves from phishing attacks. Our team of experts can help you design, implement, and manage your cloud infrastructure, ensuring that your sensitive information is protected. We provide ongoing support and expertise to ensure that your solutions and services are successfully implemented and managed.

Antivirus Solutions
ANON IT Solutions offers antivirus solutions that help businesses protect themselves from phishing attacks. Our team of experts can provide you with the latest and most effective antivirus software to protect your business against malware, viruses, and other malicious software. We understand that no single solution can provide 100% protection, that’s why our team is dedicated to monitoring and updating your systems regularly to ensure that your business is protected at all times.

Our antivirus solutions include regular scanning, updates and monitoring of your systems, ensuring that any potential threats are identified and dealt with quickly. Our solutions also include advanced features such as real-time protection, automatic updates, and behavior-based detection to provide an added layer of security.

Additionally, our team is also trained to provide you with the necessary training and education to help you and your employees understand how to identify and prevent potential threats, and how to respond to an attack should one occur. We understand that many phishing attacks are successful because of human error, our team will work with you to ensure that your employees are aware of the dangers of phishing and how to protect themselves.

You’ve Gone Phishing?!

Phishing isn’t going away, it’s evolving. And the User?
With our current attention span -9 seconds – and email overload, not every employee could become a phishing detective.

We are only human and can be manipulated.  Therefore, you should expect to receive occasional phishing emails.

Now, internal security controls must decide and test to block and deal with the resulting disaster. This means that malicious procedures following activation of phishing payloads are prevented, detected, and addressed.

Phishing Attacks Up 61% !!

[EYE OPENER] Phishing attacks increased by 61% compared to 2021.
So far, 255 million attacks this year!!

Security Magazine wrote this week about SlashNext’s recent disclosure report on scams. “SlashNext analyzed billions of URLs based on links, attachments, and natural language messages across email channels, mobile devices, and browsers over six months in 2022 and found over 255 million attacks. attack, or the rate of phishing attacks increased by 61% compared to 2021.

Findings from SlashNext’s State of Phishing 2022 report highlight that previous security strategies, including secure email gateways, firewalls, and proxy servers, no longer stop threats, especially as malicious actors increasingly launch these attacks from trusted servers and from personal and work email clients. “

Key findings from the report include:

Cybercriminals are redirecting attacks to mobile and personal communication channels to reach employees. SlashNext has seen a 50% increase in attacks on mobile devices, with scams and credentials theft topping the list of payloads. In 2022, they detected an 80% increase in threats from trusted services such as Microsoft, Amazon Web Services or Google, with almost a third (32%) of all threats currently hosted on trusted services. 54% of all threats detected by 2022 are “zero hour” threats, showing how hackers are changing tactics in real time to improve success and scientific services and their information technology.

What Protects You from Phishing Attacks?

We often say “Think before you click” – and that’s great advice! However, people always click before they think. Why? This is because it is not just about knowledge. We’ve all learned the stop signs and when to brake, but there are still plenty of accidents. We are emotional beings, we feel that before we think, we are curious, biased, and sometimes overly optimistic. This is why Habits and Habits are so important. They act as protective railings. Even if you start with just one habit, you will greatly increase your awareness, and gradually you will add more. Before replying to or clicking on a link, adopt these habits:

If it’s urgent, don’t let your emotions cloud your judgment.

If you get an urgent email from your boss, a text from your bank, or see a great offer on Facebook, take a moment, let your emotions cool, and read it out loud. Does this make sense, could it be a phishing email? Scammers are running out of time too, they need you to act fast before they realize you’ve been scammed. So don’t let them!

Call and Verify!

One of the best ways to combat a phishing attack is to make sure you’re talking to the right people. For example, when you buy a house, someone could spoof your attorney’s email and send you information about fake wiring. So call and check.

Check the Address

Always check email addresses and URLs for typos. Whenever you need to log in, it’s best to enter the URL manually instead of clicking the link in the email. While spell checking in the sender’s address is a MUST, it’s not enough, as there are ways to spoof an email address to make it look like the real one. So whenever you need to take action, such as sending sensitive information, transferring money, or going online, make it a habit to call the sender and verify.

Enable Multi-Factor Authentication

Let’s say you got scammed by an email scam and they got into your gmail account they can now start hitting “reset password” on your other apps and guess the link where to reset password? Your gmail account is hacked. And that’s why passwords are not enough to protect your digital life. We need a second authentication method or what is commonly known as multi-factor authentication. This is when you need to enter the code after entering the password to complete the connection. This code is sent to your phone or generated by an app that generates a new code usually every 45 seconds. This way, even if your password has been stolen, they don’t have a second code to enter. Many apps have this option, but it’s disabled by default, you can usually find it in settings -> privacy or security and find Multi-factor or two-factor authentication. Using an authenticator app is the preferred method, as scammers have also found a way to trick you into giving them a code that has already been sent to your phone. Microsoft or Google Authenticators are two apps you can download from the App Store that will generate these codes for you.

Look at the Style of the Message

For example, is the style of the email different from previous emails you have received from this particular person. Are you waiting for this email? Does it make you anxious, stressed, excited, happy, or any other emotion that makes you want to do something?

Ask Questions

If the suspicious message is from a family member or friend, you can ask simple questions that only you and them know. If it’s your CEO or someone you don’t directly report to and you don’t feel comfortable calling them, talk to your manager.

Security Awareness Training

Cybersecurity education and habit building are essential. The more you know about scams, the better you can spot them. Security awareness training will include practical stories and tips that can help us protect our digital lives wherever we are – at work or at home.

BE AN EMAIL SUPERHERO, THINK BEFORE YOU CLICK!!

CISA – CYBERSECURITY AWARENESS MONTH

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) kicked off Cybersecurity Awareness Month a few days ago, following a proclamation by President Biden designating October as a time for the public and private sectors to work together to continue raising awareness about the importance of cybersecurity and equip the American people with the resources needed to be safer and more secure online. Throughout October, CISA, in partnership with the National Cybersecurity Alliance (NCA), will focus on what it means to “See Yourself in Cyber” by highlighting the actions that all Americans can take to raise the baseline for cybersecurity across the country.

“To build a more resilient nation, everyone—from K through Gray—has a role to play, which is why our theme for this year’s Cybersecurity Awareness Month is ‘See Yourself in Cyber,'” said CISA Director Jen Easterly. “This October, we are taking this message directly to the American people because whether you’re a network defender or anyone with an internet connection, we all have a role to play in strengthening the cybersecurity of our nation. Throughout the month, CISA will be engaged with communities across the country to promote cyber hygiene—simple but effective ways to keep Americans safe online through basic steps like enabling multi-factor authentication; using strong passwords and a password keeper; recognizing and reporting phishing; and promptly updating software. Together, we will make better cybersecurity a reality.”

Throughout October, CISA will encourage Americans to “See Yourself in Cyber,” whether you are already working in cybersecurity, or you’re a vendor or supplier, an infrastructure owner or operator, a student, a job seeker, or an individual who uses the internet for work, school, or entertainment.

For individuals and families, we encourage you to See Yourself taking action to stay safe online. That means enabling basic cyber hygiene practices:
update your software, think before you click, have good strong passwords or a password keeper, and enable multi-factor authentication (meaning you need “More Than A Password!”) on all your sensitive accounts.
For those considering joining the cyber community, we encourage you to See Yourself as part of the cyber workforce. We’ll be talking with leaders from across the country about how we can build a cybersecurity workforce that reflects the diversity of our nation, and one equipped to deal with the increasingly complex and challenging cyber threat landscape. We look forward to working together to build safer, more resilient systems for our industry partners.

NCA’s Cybersecurity Awarness Month website

CISA’s Cybersecurity Awarness Month website

About the CISA

As the nation’s cyber defense agency, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day. Visit CISA.gov for more information.