The greatest asset becomes the biggest risk

Issue 1 2022 Information Security

It's never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. The erosion of the cyber perimeter as a result of new virtual workforce models necessitates a new approach, one that baselines activities and behaviours and protects employees by highlighting anomalies.


John Mc Loughlin.

Companies deploy multiple security, intelligence and productivity monitoring tools in the hopes of working smarter and safer. However, none of these solutions focus on the humans driving day-to-day operations.

Dtex offers the world’s first Workforce Cyber Intelligence Platform, capturing hundreds of elements of behavioural telemetry to produce dynamic 'Indicators of Intent' and deliver holistic, real-time awareness about the workforce’s activities – without invading personal privacy.

It also empowers business owners to easily see, understand and act on contextual intelligence using scoring frameworks proven to stop insider threats, prevent data loss, maximise software investments and protect the workforce, wherever they may be.

Workforce Cyber Intelligence is a new approach to enterprise data collection and analysis that focuses on understanding how, when, why, where and for how long employees and third parties interact with data, machines, applications and their peers as they perform their job responsibilities to create a safer, smarter and more secure enterprise.

Workforce Cyber Intelligence is designed for today’s modern, distributed workforce model. It provides complete visibility into user and account activity, keeping all data anonymous to protect privacy and only shining a light on abnormal or inefficient behaviours that indicate risks and areas for operational improvement.

It is critical to ensure employees know that personal activities and behaviours that don't directly increase organisational risk, cause cultural conflict, or limit successful operations remain private and anonymous.

People are the heartbeat of every organisation, so the human factor is the most important element of a business’ ability to operate effectively and safely. The enterprise workforce’s behaviour, habits and interactions ultimately determine opportunities and threats, the investments that contribute to efficiency or waste, how and where risks emerge and if compliance mandates are met.

Dtex’s Workforce Cyber Intelligence Platform enables organisations better understand their workforce, protect their data and make human-centric operational investments.

The ideas of employee monitoring, insider threat detection, data loss prevention (DLP), User Activity Monitoring (UAM) and human risk management aren’t new. The greatest challenge is improving security and operational performance in a way that benefits both the company and the employee. The best solution protects sensitive information and employee privacy.

Privacy

Employees are increasingly aware of and diligent in understanding how employers monitor work activities and behaviours. Employees want to know that personal activities and behaviours remain private and anonymous unless those activities directly increase organisational risk, cause cultural conflict, or limit successful operations. This is a fair ask of employees and becoming a major factor in compliance regulations and mandates.

Gathering and analysing data

One may think that it is easy to gather a lot of data for analysis, discover some findings and report on them. Unfortunately, it's not, the process is straightforward, but the mechanics present challenges. Collecting user data often involves overtaxing endpoints and the network and consequently impeding end-user productivity.

Analysis of the captured data carries fears of data misuse and privacy infringement, not to mention wasted resources on false positives and 'noise'. Noise is information that calls attention to insignificant findings that present little or no risk. Noise can overwhelm and mask true threats and is a distraction for scarce security resources.

Managing access and perception

Arguably one of the tougher challenges of collecting user data and monitoring the workforce is the workforce’s perception of an organisation’s motivation. When employees hear about monitoring, their initial impression is negative. Changing those perceptions requires openness and assurance that any data being collected is intended to protect individuals, sensitive data and the organisation and is handled in the most secure, private and respectful way possible.

Privacy will be the primary concern to alleviate. In addition to regulatory requirements, protecting employees’ privacy is crucial if you want to have employee engagement and partnership. Managing access to the collected data is another challenge to overcome. Information on individual employees should be anonymised and unmasked only on a strict need-to-know basis.

Data minimisation is a critical prerequisite to privacy. Invasive surveillance such as keystroke logging and screen capture, as well as the collection of user content such as emails and instant messages, isn’t required to detect insider risks and protect organisational data. Employees don’t want corporate IP leaked on purpose or by accident.

Protection for the employee

Workforce Cyber Intelligence protects employees in many ways, including increased security awareness, smarter engagement and fewer violations or incidents and the corresponding interruptions. Having a clear and unalterable audit trail provides non-repudiation and defence for the employee. But perhaps the biggest benefit is simply protection against external threats.

Employees are an appealing target of malicious actors and are subject to constant exploitation attempts. People by their nature want to be helpful and trusting and these are the underlying human traits enabling social engineering.

Businesses need to shift their focus and learn from the workforce by observing employees' interactions with data, systems and machines and using that intelligence to improve performance.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.