Dealing with the people risk factor

Issue 7 2021 Security Services & Risk Management

The insider threat has become more complex to mitigate. Access control lists, both from a network and user perspective, as well as physical security of data storage have in the past been used to prevent breaches. The trouble nowadays is that data needs to be easily accessible and with that comes additional risk.


Peter Clarke.

Moreover, one would assume employees need to understand that they must be sceptical about emails and scrutinise the source to ensure they are from whom they purport to be. One would think with the amount of publicity around email scams that staff would be wary about clicking on links in emails, but it is still one of the most successful routes into a company’s confidential data.

Damaging behaviours like this and oversharing on social media, or believing requests delivered through electronic channels without first verifying them, remain common access points for threat actors.

Mimecast research revealed that the most pressing security concerns remain focused on data breaches, phishing, spear-phishing and ransomware. The report notes that these are all areas in which good security awareness training can be highly effective at reducing risk.

Tools to help prevent the threat from within

Multi-factor authentication(MFA) is an effective and relatively inexpensive way to limit access to data. Users are required to verify identity through an authentication code before company resources can be accessed. This can be deployed via SMS, or better still, a more efficient authenticator app.

Switches: this technology has been around for some time. If the right hardware is in place, one could look at deploying technologies such as 802.1x where every device on the network needs to be authenticated before it can gain access to network resources.

Data leak prevention(DLP) is something that most well-known firewall brands should have enabled. Depending on the technology being used, DLP allows you to prevent sensitive information, such as bank account details; ID numbers etc., from leaving your network.

Zero trust: Attackers that breach the perimeter one way or another are either a staff member or impersonate an insider. As such the ‘Zero Trust’ security model is being adopted at a fast rate globally. The Zero Trust model was created in 2010 by a principal analyst at Forrester. Today it is repeatedly implemented as organisations scramble to protect enterprise systems against increasingly sophisticated attacks. The focus for organisations should be to work on a Zero Trust network model.

Phishing protection and education</i>: One of the best defences for phishing attempts is education. Threat actors are finding ways to bypass mail and other security systems by composing authentic looking mails and directing users to authentic looking, as well as genuinely authentic websites. These sites would then ask for sensitive information, which is promptly sent to the attacker.

Simple things for staff to look out for include:

1. If something looks too good to be true, it probably is. Do some research and ask around to verify.

2. If a staff member is not expecting a PO or payment instructions from someone, report it to IT immediately.

3. If a staff member sees that a CFO, or other high-ranking exec has asked them to expedite a payment, they must confirm that the mail originated from the specific address and is from the true source, or, if suspicious, report to IT immediately.

Edge protection: Protecting the network edge has become more important than ever because of the increasing number of endpoints organisations rely on, including but not limited to desktops, laptops, mobiles and IOT devices. As networks expand so does the potential attack service.

At an absolute minimum, a well-configured next-generation firewall needs to be put in place that makes use of web filtering, application control and intrusion prevention to aid in the protection of the network edge. Larger organisations may need to look at specific appliances such as Web Application Firewalls and Application Delivery controllers for additional layers of security – the one caveat is that this approach can be quite costly.

Server and data centre security: This area has several similarities to edge protection in that servers and data centres are still sitting on their own network edge. Depending on requirements, a capable next-generation firewall should be one of the first things to look at deploying. Dedicated security appliances for web and application security can be an asset. Servers and data centre resources are generally more exposed to threats as this is where most of an organisations’ crucial data or applications sit.

Anti-virus might seem like an obvious thing to consider, but there are several things that organisations can overlook. You need to consider if the AV solution you are using is designed to be run on server infrastructure. Servers are far more complex by design than a normal PC and often run applications and systems that need AV solutions that can work with these.

Lastly, backup: this is of the utmost importance.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Vetting people in security estates
iFacts Security Services & Risk Management Residential Estate (Industry)
In today’s security-conscious South Africa, estate management’s responsibility extends beyond gates and patrols; it involves ensuring that every resident, staff member, and service provider upholds the community’s safety standards.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
ProtecLink 2025 spotlights industry tensions and transformation
Magtouch Electronics t/a Ithegi Electronics Security Services & Risk Management News & Events
ProtecLink 2025, created and hosted by Ithegi Electronics, brought together key stakeholders from the security, finance, and innovation sectors under the theme "Connecting Security, Finance, and Innovation: Inspiring Transformation in the Industry."

Read more...
SSG Holdings acquired by Fidelity Services Group
News & Events Security Services & Risk Management
Fidelity Services Group has successfully acquired a majority shareholding in SSG Holdings. The acquisition builds on Fidelity’s track record of strategic expansion, including previous high-profile acquisitions.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.