Evolving threats are putting businesses at risk

April 2015 Infrastructure

For a country like South Africa that is visibly paranoid about security, the country’s information security landscape is seriously lagging in terms of awareness and practical, relevant application. Today’s chief information officer (CIO) needs to keep tabs not only on external security threats, but on internal threats as well, because the potential for disaster is inherent in both.

External threats have long been a focus for CIOs, and while progress has been made in ensuring that organisations are protected, these threats continue to evolve. Internal threats, however, have not been receiving the attention they deserve. Such threats can be the result of employees acting with or without malicious intent; but regardless of the intentions, they still have an impact.

Lise Hagen, IDC’s research manager for software and IT services in Africa, believes the problem is that many organisations overlook the internal threats, leaving them vulnerable and often surprised when the inevitable happens.

Internal threats are real

“Internal threats are usually not malicious and can be as simple as an employee losing a flash drive or having a laptop stolen from the boot of their car,” says Hagen. “However, disgruntled employees can have a devastating impact on the organisations they work for, and this is where CIOs need an operational benchmark. In this regard, data analytics can play a key role in identifying abnormal behaviour, such as a sudden increase in downloads. Such analytics can be automated and need not be expensive, but their implementation requires some proactive thinking.”

Generally speaking, the most likely perpetrators of malicious insider attacks are systems administrators and other IT staff with privileged systems access. “Technically proficient employees can use their access levels to open back doors into company computer systems or just engage in sabotage and thereby wreak havoc,” adds Hagen. “Data loss is one of the biggest areas of impact when it comes to internal attacks, but they can also result in a loss of customer and shareholder confidence and cause damage to the organisation’s reputation, market share, and brand.”

The key to protecting the organisation from internal security threats is to establish clear, written security policies that cover physical security as well as data and network security. “Get buy-in from the bottom up, but lead from the top down,” advises Hagen. “Make it clear why these policies are important and establish good physical security too. Make it part of the organisational culture by integrating it into the hiring, onboarding, and orientation process, as well as into annual reviews.”

External threats are evolving

If this wasn’t enough cause for concern, Hagen also explains that external attacks are becoming much more targeted: “Attackers are using more advanced and more determined phishing methods, identifying high-value account holders and then employing spear-phishing techniques to ensure that their attacks are successful. Social media plays an enormous role in this regard; once the attacker has developed a list of relevant employees, they will use social media pages to gather detailed intelligence that can be used to craft a targeted attack on the pre-identified individuals. This, of course, relates directly to the amount of information we share about our personal and professional lives on public forums such as Facebook, Twitter, LinkedIn, and Instagram.”

With emerging technologies like virtualisation, cloud computing, and social media becoming the new norm, organisations must secure the assets that they don’t own, control, or manage and that aren’t tucked away behind their firewalls. “This will require a frequent resetting or rebasing of the organisation’s security posture, with ongoing evaluations taking place as new infrastructure emerges and a clear focus on selecting security technologies and strategies that are designed to deal with these new realities,” says Hagen.

To this end, CIOs will need to look at ensuring the early detection and mitigation of targeted, unknown attacks through granular logging and policy enforcement of internal and external regulations. “When sourcing solutions, CIOs should interrogate IT services providers on how their offerings align with the demands of next-generation technologies,” advises Hagen. “And, given the high value placed on security, any new product, solution, or service will have to be underpinned by resilient and advanced security features.”

Security 101

Featuring prominently among the focus areas of the IDC South Africa CIO Summit in March will be the issues that CIOs must consider when developing a coherent security strategy. The first thing that must be appreciated is the fact that security is not a product, but rather a frame of mind. And given this reality, IDC encourages CIOs to take the following steps when reviewing and revising their strategies:

* Create and revise the risk portfolio

* Consider a metric-based approach

* Plan, update, and enforce security policies

* Implement ongoing user awareness and education programmes

* Spend smarter, not more

* Align existing internal governance, risk, and assurance strategies. It is important to note that this does not just sit within the domain of the CIO, but also intersects with the legal and compliance teams, and even finance.

Implementing a solid security strategy is no longer a one-off project; it has become a long-term commitment that requires ongoing evaluation as areas for optimisation are highlighted during the course of the process. “Security needs a holistic approach comprising all components, including employees, suppliers, physical, software, hardware, network, and data,” concludes Hagen. “It is therefore not only helpful, but critical to properly align these internally and benchmark security strategies against industry peers to ensure that all the relevant bases are covered.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.