Wolfpack Information Risk

The Wolf Howl April 2023 Edition – Do not be Fooled / Register for the Information Security Risk Webinar


Wolfpack Information Risk provides specialist information and cyber threat consulting, training, awareness and incident support services to African governments and organisations.

Mission: We are passionate defenders of communities, companies, and countries against cyber threats.

Vision: Wolfpack will be the catalyst that drives the greatest positive cybersecurity impact on the African continent.

Greetings Cyberwolves

This newsletter is dedicated to all the hard-working cybersecurity specialists working 24/7 to protect their companies’ and communities’ online safety. Cybercriminals also work hard to take advantage of every holiday, pandemic, or political situation to fool users and capitalise on their errors.

Whatever form of content your company consumes, cybersecurity is among a company’s most valuable assets and risks. Do not let the joke be on you when protecting your Crown Jewels. It is a fine line between a prank and an online scam that could cause havoc and result in financial loss, reputational damage, and stress.

As a company that understands and prioritises information protection, we recommend the following step to avoid looking like a fool:

  • Establish cybersecurity as a business priority with clear vision and responsibilities.
  • Establish sound and robust processes for managing cyber risks.
  • Identify mission-critical information assets or crown jewels and understand which key business areas (processes, people and technology assets) are at risk.
  • Conduct a cyber risk assessment using a best of breed frameworks covering cybersecurity, privacy and resilience. Assess the main adversarial threats to your’Crown Jewels’.
  • Determine and implement the most appropriate method to protect the ‘Crown Jewels’. Build a prioritised roadmap to adopt cybersecurity fundamentals to safeguard confidentiality, integrity and availability of data and Information Technology systems.
  • Build internal competencies to maintain cyber resilience and adequately prepare for cyber threats.
  • Initiate a shift in employees’ mindset to enable a culture of continuous security improvement in all aspects of business processes via continual awareness training.
  • Undertake routine tests to monitor effectiveness and make appropriate necessary improvements.

Preventing cybersecurity incidents will ensure customer retention and confidence by demonstrating that you value their business and data and assure sustainability of operations, financial stability, and competitive advantage.

It is time to celebrate everyone who has taken a step forward to improve cyberspace.

Thank you for your continued trust and support.

Yours Securely

We extend our gratitude to all who participated in our inaugural webinar centred around Information Security Governance and unveiled the SA Information Security Thermometer Report.

If you could not attend or encountered technical difficulties during the session, you can access the webinar by CLICKING HERE.   

Our upcoming webinar, scheduled for May 25th, will delve into Chapter 3 of the report, specifically Information Security Risk. This session will explore the maturity of enterprise risk management functions in South Africa and the ERM tools utilised by various organisations.

Our Webinar Sponsor, Gijima, and IBM Business Partner, will share their market observations and experiences with Wolfpack’s MD, Craig Rosewarne.

“A reminder to be careful what company information (code, data) we input into CGPT as it is not recoverable and cannot be deleted.” Wolfpack’s Head of Awareness, Masenyane  Lekgowane.

What’s the best mix of detection, response, readiness, and vendor experience for your organisation? Fill in your cybersecurity bracket to select your Top Four cyber defence strategies and see how it stacks up against others! 

To play, click a strategy to advance it to the next round, ending in your Top Four. Share your results on social media and see other people’s Top Four!

When Russia initiated its full-scale invasion of Ukraine, a second, less visible battle in cyberspace got under way.  The BBC’s cyber correspondent Joe Tidy travelled to Ukraine to speak to those fighting the cyber war, and found the conflict has blurred the lines between those working for the military and the unofficial activist hackers.

The Adventures of CISO Ed & Co attempts to highlight the everyday frustrations, heroism, and insights of CISOs and infosec teams while bringing some fun to the serious business of cybersecurity. We hope CISO Ed & Co. brings a grin as you  go about your day. Compliments of Balbix

Have you ever heard of Financial Scams? Let us help you understand what it is.

A renowned security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT.  With just a single click, a threat actor could easily exploit the vulnerability and gain complete control of any ChatGPT user’s account.

As a result, opening the doors to sensitive data let attackers execute unauthorized actions; the whole is termed “Account Take Over.” ZeroFox can help prevent Account Take overs.

It’s here! Our State of Vulnerabilities report details the top three software flaws found by the Synack Red Team, why these flaws are so prevalent and how human-led testing can piece together critical vulnerability trends.

The same vulnerabilities rear their heads again and again despite a constant parade of awareness campaigns and pentesting solutions.  At Synack, we’re committed to finding the vulnerabilities that matter. 

Please share this newsletter if you have benefited from the content.

We look forward to hearing from you.

Scroll to Top