Protect your business against cybercrime – train your own hackers

Cyber criminals have become relentless in their search to find new ways to attack. According to the 2015 internet security threat report by Symantec, last year alone more than 317 million new pieces of malware were created – that’s almost a million rogue software programmes created each day with the purpose of stealing or sabotaging information.

SMEs & Corporates Need to Have the Skills to Deal with Cyber Crime

It’s not only large companies that are a prime target, but small and medium businesses too. Cyber crime costs the global economy $445 billion a year and South Africa about R5.8 billion a year. In Norton’s 2013 cyber crime report, South Africa was ranked third worst in the world in terms of its cyber crime threat. And we’re still a very soft target when it comes to cyber crime

CEH Training Can Help Address The Threat

Businesses need to step step up their game and take a more proactive stance against cyber threats. And that means having people on the inside that think like hackers.

Certified Ethical Hacker training or CEH training is the next line of defense against cyber attacks. It was developed by the International Council of Electronic Commerce Consultants, known as the EC-Council, and is available here in South Africa from technology company Jumping Bean – an approved training centre for the EC-Council. CEH training helps businesses achieve optimal information security by enabling them to scan, test, hack and secure their own systems.

Mark Clarke, Jumping Bean founder, adds, “By training key staff to become ethical hackers they’ll be able to think like hackers. They’ll know what to look out for, what makes your network and applications vulnerable, how to improve them, how to prevent data theft and fraud from taking place, and what countermeasures to take.”

Jumping Bean’s CEH course is offered to site administrators, security officers and professionals, auditors, computer forensic investigators and anyone who is concerned about the integrity of their IT assets and network infrastructure.

The course involves mastering penetration testing, footprinting and reconnaissance (information gathering), and social engineering. Trainees find out how to scan and sniff networks, evade firewalls and IDSs, crack passwords and cover their tracks. They also find out how to hijack Web servers and Web applications, hack wireless networks and create Trojans, backdoors, viruses and worms.