Who is watching your data?

July 2013 Cyber Security

Information theft is the most profitable crime in the world today as well as the one posing the least risk to the criminal. In most instances, breaches are not done by mysterious genius hackers in Eastern Europe, but by insiders who have been given the keys to the kingdom as part of their jobs, while their other job is working for a syndicate.

With 75% of all information security breaches in corporations being against the company’s databases, one must ask why more companies are not taking effective action to protect their most valuable assets, their information.

“If a stranger walked into your business and asked for the database administrator’s password, would you give it to him? The answer, one hopes, is no,” says Hedley Hurwitz, MD of Magix Integration. “That being the case, if you hire that stranger to look after your databases today and he starts work tomorrow, one of the first things he receives is the password and access to all your data.”

Hurwitz adds that corporate file servers are even more poorly protected and even more at risk than databases. The data on files servers is completely unstructured, yet contains a variety of files, from spreadsheets to statements, business plans and payment data.

Protecting your data, whether unstructured or structured (database) requires specific tools and knowledge, as well as insight into the processes with which legitimate users access and use the data.

“When you know what legitimate access looks like, it will be easier to implement monitoring solutions that identify abnormal activities for further investigation,” adds Hurwitz. “Monitoring solutions will also identify legitimate transactions that cross normal boundaries so that they can be verified before they are approved.”

Securing data effectively requires a multi-faceted approach incorporating tools, knowledge and constant user activity monitoring. The combination of these does not need to break the bank, but can prevent data loss from breaking the business.

For more information contact Magix Security, +27 (0)11 258 4442, hedleyh@magix.co.za, www.magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exploiting the global pandemic
Issue 7 2020 , Cyber Security
Cyber criminals targeting remote work to gain access to enterprise networks and critical data reports FortiGuard Labs.

Read more...
Integrated security is key to Huawei Mobile Services
Issue 7 2020 , Cyber Security
To ensure sufficient mobile device security, the technology giant incorporates security into its chip, device and cloud capabilities.

Read more...
Cybersecurity becomes key enabler of sustainable business growth
Issue 7 2020 , Cyber Security
The adoption of rushed digital transformation strategies has left many facing unintended complexities and challenges.

Read more...
Africa under cyber-attack
Issue 7 2020, Kaspersky , Cyber Security
Kaspersky has reported that South Africa, Kenya and Nigeria saw millions of cyber-attacks in 2020 and the year is not over yet.

Read more...
Challenges healthcare is facing
Issue 6 2020 , Cyber Security
The healthcare industry has been forever changed by digital transformation, but cybercriminals are targeting the healthcare sector now more than ever.

Read more...
Secure IoT devices and networks
Issue 6 2020, Technews Publishing , Cyber Security
Check Point Software’s IoT Protect solution secures IoT devices and networks against the most advanced cyber-attacks.

Read more...
SentinelOne Protects the AA
Issue 6 2020 , Cyber Security
National provider of 24-hour motorist assistance stays on the road thanks to accelerated, AI-powered threat prevention, detection and response.

Read more...
Protecting database information
Issue 6 2020 , Cyber Security
SearchInform has officially released Database Monitor, a solution for the protection of information stored in databases.

Read more...
Work from home securely
Issue 5 2020 , Cyber Security
First Consulting provides enterprise-level IT security to working-from-home employees at more than 40 South African organisations.

Read more...
Agility, meticulous alignment and testing
Issue 5 2020 , Cyber Security
Data loss can put the nails in the coffin for unprepared businesses. Investing in cyber resilience is key to succeed in the age of digital transformation.

Read more...