Wolfpack Information Risk

The Wolf Howl February 2022 Edition – Spyware Recovery Guide / Protecting The Crown Jewels


Wolfpack Information Risk provides specialist information and cyber threat consulting, training, awareness and incident support services to African governments and organisations.

Mission: We are passionate defenders of communities, companies, and countries against cyber threats.

Vision: Wolfpack will be the catalyst that drives the greatest positive cybersecurity impact on the African continent.

Greetings Cyberwolves

A new year always brings many new aspirations, possibilities, and pressures. Many people look forward to starting the new year on a clean slate.

Employees return to work with their new year’s resolutions in hand while their organisations diligently implement budgets, goals, and strategies for the new year. Our cybersecurity professionals work around the clock to protect company “Crown Jewels” and remain committed to the fight against cybercrime.

Wolfpack was successful in many areas despite the difficult conditions in 2021;
– Assisted victims of cybercrime.
– Educated SME’s about cyber threats.
– Established meaningful client engagements to help reduce cyber risks and implement processes to reduce vulnerabilities significantly.
– Provided a comprehensive training approach to make a difference in combating cybercrime.

Whatever 2022 has in store, Wolfpack remains committed to creating, developing, and providing world-class content, training, advisory, awareness, and online solutions that will contribute to the cyber safety of our community, companies, and country.

Yours Securely

Chuck Brooks FORBES articles have highlighted some of the more significant cyber statistics associated with our expanding digital ecosystem. In retrospect, 2021 was a very trying year for cybersecurity in so many areas. We are just learning some statistics that will certainly be trending in 2022. Learn what we need to fortify and bolster cybersecurity throughout the coming year. 

Critical assets known as the ‘Crown Jewels’ are high-value assets that would cause business disruption if compromised. Anything valuable attracts the attention of criminals, and this is no different in cyberspace. Information Technology systems and data make up a significant portion of an organisation’s Crown Jewels

South Africa’s leading telecommunication operators, MTN, Vodacom, Telkom SA, Cell C and Liquid Intelligent Technologies, have established a non-profit organisation. The Communication Risk Information Centre (Comric) seeks to protect their network investments better and advance the country’s participation in the Fourth Industrial Revolution.  

Have you ever wondered what the next steps will be after surviving a cyber-attack?

 Recovery can be a monumental task. Remember that behind every scar is an untold story of recovery and survival.  This spyware recovery guide answers that question for someone recovering from a spyware attack. The guide includes helpful steps to recover from falling victim to spyware.

Weekly Threat Bulletin: 01/14/2022 – 01/20/2022

There are many definitions for threat intelligence, but at its core, threat intelligence must be actionable, timely and relevant to the end consumer. It is specifically related to the surface, deep and dark web, social media platforms, mobile app stores and other publicly available platforms with real business use and cyber risk.

In today’s remote and digital-first world, digital threat intelligence provides the context and correlation to understand the risks facing businesses across the public attack surface at scale.  

Please share this newsletter if you have benefited from the content.

We look forward to hearing from you.

Scroll to Top