Send An Email
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.
Data protection is the process of safeguarding important information from corruption, compromise or loss.
SzCIRT is the Computer Incident Response Team (CIRT) for Eswatini and acts as a focal point in coordinating cybersecurity incidents for the Government Departments, Internet Service Providers, and other relevant entities within the country. SzCIRT monitors incidents, provides early warnings, disseminates information and enforces cybersecurity standards and minimum specifications for Eswatini.
SZCSIRT is currently under the office of the communications regulator of Eswatini, Eswatini Communications Commission (ESCCOM)
These can be any real or suspected adverse event in relation to the security of computer systems or computer networks to the act of violating an explicit or implied security policy. The incidents could include activity such as:
- attempts to gain unauthorized access to a system or its data
- unwanted disruption or denial of service
- unauthorized use of a system for the processing or storage of data
- changes to system hardware, firmware, or software characteristics without the owner’s knowledge, instruction, or consent
SZRT constituents; people or organizations that the CIRT is designed to serve or support that includes:
- Critical ICTs Infrastructure
- Défense and Security Forces
- Financial and Banking institutions
- Academic institutions
- General public
Incidents can be reported to the SZCISRT through:
- Incident reporting form: https://ncsirt.org.sz/report-an-incident/
- Email: firstname.lastname@example.org
- Telephone: 24067000
Malware, short for malicious software, is a program or file that is intentionally harmful to your computer, network, or website. These types of cyberthreats infect your system to gather sensitive data, disrupt operations, or spy on your digital activity.
Ransomware is a specific type of cyberattack where the attacker forces you to pay a ransom fee to regain access to your system or files. Common types of ransomware attacks include scareware, lock-screen ransomware, and encryption ransomware.