Great advice opportunity - Refueled


Digimune (Powered by Zerofox), the Global End to End Digital Risk Solution

Digimune and One Loyalty

The last twelve months has resulted in an unprecedented number of people joining the Work-from- home and Educate-from home category. Opportunistic cyber-criminals have used the situation to their advantage, launching numerous and increasingly detrimental financial and reputational attacks on Businesses, Individuals and Families, which has resulted in large and expensive insurance claims, as well as un-warranted emotional carnage.

“Irrespective of whether you operate a one-person business or a large enterprise, the risk to sustainability and operability are the same. More people have a larger online presence and use digital platforms to engage customers, interact with employees and grow their businesses. Almost all businesses rely on email, the Web, social media and other public platforms for their operation,” says Simon Campbell-Young the VP for Global Sales at

“One Loyalty is very excited to collaborate with Digimune to promote and sell this highly relevant and unique product in the market. We truly believe this world-class product is cutting edge and a leader in the market and will be highly utilised.” says Anthony Kotton Managing Director at One Loyalty.

“Digital transformation is having a wide-ranging impact on the business , personal and family environment, creating both opportunities and unique challenges. For example, trends like e- commerce, social media marketing, big data, machine learning, AI and IoT could lead to huge productivity gains from a business perspective. Similarly, digitally educated kids and home-users, is leading to faster minds and digital adoption. However, digital disruption to existing businesses and access to dangerous or illicit content, can lead to increased risks, and emotional scarring”, he adds.

Campbell-Young says that there are four categories of business risk:

  1. Cyber (insider threats, phishing, malware, and data loss)
  2. Revenue (customer scams, piracy, and counterfeit goods)
  3. Brand (impersonation and slander)
  4. Physical (physical threats and natural disasters).

He suggests considering a complete, multi-modal solution for these elements:

  • Deep and Dark Web monitoring
  • Brand protection
  • Business page protection
  • Domain monitoring and protection
  • Executive protection
  • Takedown and remediation.

“This is particularly relevant in the insurance, banking, retail and corporate and sectors to mitigate new digital risks and is meaningful for personal use,” says Kotton.

Deep and Dark Web

The Dark Web accounts for approximately 48% of the internet1. It is believed that the deep web occupies a similar amount as well. This means that the Deep Web and Dark Web together take up around 96% of the internet. The remaining 4% is taken up by the ‘surface web’ (the portion of the internet that is indexed by search engines and can be easily traced). These channels represent new risks for business including data exposure, information leakage and corporate espionage.

“The Deep and Dark Webs harbour a massive source of data content and communication that often goes undetected and untraced. Traditional search engines offer no visibility into these channels, making them a prime market for bad actors looking to sell proprietary or personal information. The ideal is to use a Deep and Dark Web monitoring solution that safeguards your business information against data leakage, breaches and the illegal selling of data on a broad range of deep and dark web sites, forums and chatrooms including TOR, I2P, ZeroNet and Paste Sites,” says Campbell-Young.

Brand protection

Because social media is the latest tool in the evolution of brand growth and engagement programmes, safeguarding it should be the cornerstone of a brand protection programme. “Ideally one should use a platform that secures their organisation against critical issues like account hijacking, offensive content posted to corporate pages, brand impersonation accounts and scams that target customers,” says Campbell-Young.

Business page protection

Customers and prospects increasingly engage online and contracts can be won or lost on social networks. With this sobering thought top of mind, businesses need a solution that will immediately block, hide or remove racial slurs, sensitive data like credit card numbers, competitor posts, scams and malicious links.

“You want to be able to customise exactly what you do and what you don’t want posted to your pages. And once detected, your protection solution should be able to immediately enforce a number of actions, including hiding or removing a post or blocking a repeat offender’s profile,” says Campbell-Young.

“This is a very powerful digital risk prevention solutions for small and large businesses who cannot have eyes and ears everywhere all the time,” says Kotton.

Domain monitoring and protection

“Your website is often the first way in which customers engage with your organisation. Attackers mimic your domain to dupe unsuspecting users into believing they are interacting with the official brand. You therefore need to be able to protect your corporate websites, brand and revenue by finding and eliminating domain squatters and typo phishing campaigns that target your employees and customers,” says Campbell-Young.

Executive protection

High-value employees now give away more information in the social media age than ever before, putting executives and VIPs at substantial physical and cyber-risk.

“In order to protect executive teams that need to extend visibility and situational awareness to the social and digital world, organisations need to consider an artificial intelligence platform that rapidly identifies cyber and physical risks across social media. Added to this, all organisations should employ a paid-for email service as opposed to a free one to assist in protecting all employees,” says Campbell-Young.

Takedown and remediation

There has been a huge increase in the publishing of sensitive and personal information on public and social media platforms. Also known as doxxing, this trend is not illegal as a specific offence, making it more difficult to control. Privacy-protecting actions are beneficial in a general sense and can help protect a person’s information in the event of a data breach.

“It’s advisable to adopt a doxxing protection solution that monitors and alerts on the publishing of sensitive and personal information such as names, addresses, workplace/school, phone numbers or other identifying information. Ideally you want a solution that also allows you to request takedowns on Facebook, Instagram, LinkedIn, Twitter, YouTube and Paste-bin for impersonating accounts and personal data information leakage,” says Campbell-Young.

“The products unique value proposition is the takedown option which will remove any damaging or offence information, which could cause brand damage” says Kotton.

Social media takedown use cases include:

  • Brand impersonation and counterfeit goods (trademark infringement)
  • Copyright infringement
  • Employee impersonation.Domain takedown use cases include:
  • Domain name trademark violations (with live content)
    • DCMA/copyright infringement
    • Typically includes trademarked domain name, images, logos and copyrighted content.  
    • Phishing complaints.

“With South African statistics2 showing that there are currently 36.54 million internet users, 34.93 active mobile internet users, 22 million active social media users and 21.56 million active mobile social media users, it’s critical for businesses to consider a cyber-monitoring platform that offers privacy and protection of their online presence,” says Campbell-Young.

For more information on adopting a business cyber-risk solution, contact One Loyalty or click on the links below to purchase the products.

  • Anthony Kotton (Managing Director):
  • Ryan Grill (Sales Director):

[1] How much of the Internet is the Dark Web in 2020?

[2] Digital population in South Africa as of January 2020.

Related posts
CyberRisk Management

Consider These 10 Critical Steps to Prevent and Detect Ransomware Threats


Companies need to strengthen cyber controls to counter ransomware pandemic


Cyber Security Africa Distribution appointed as Mimecast distributor into Africa


Cyber Criminals Target Intellectual Property