Dealing with the insider threat
February 2017, Cyber Security, IT infrastructure
The threats to businesses from insiders covers areas such as malware deployment, but also fraud and sharing of company data with unauthorised third parties. When looking at insider incidents, research company Gartner says about 62% of these involve employees looking to establish a second stream of income from their employer’s data, while 29% steal information when they leave to help them in the future. Only 9% are saboteurs.
Protecting your business from threats like these, even simply preventing someone from taking a customer contact list, is not that easy in an environment where data is freely available. Employees often have customer lists, business plans and other sensitive data on mobile devices – laptops, tablets and smartphones – which is reasonable as it can assist them in making sales and servicing customers. But how does a business ensure this data does not end up supporting a competitor’s organisation?
Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system, where employees and data are automatically monitored. The cloud and on-site systems function identically. Moreover, the company is also pushing out a series of behavioural analytics that can identify suspicious behaviours and raise an alert, or even lock down the suspected user.
The employee-monitoring solutions are installed on users’ computers and monitor everything they do, from application usage through to email, even including web-based email offerings like Gmail. Management is able to draw reports and trends of behaviour, while ensuring that specific data is not sent out of the company.
Teramind’s behaviour monitoring application is able to create a baseline of acceptable behaviour for users, highlighting any anomalies and reacting in accordance with company policy – which could allow manual or automatic lockdown in extreme cases. This year will also see the company releasing departmental monitoring, which monitors standard behaviours in departments, again reacting to anomalies as prescribed in the client’s policy.
Administrators are also able to customise their monitoring applications, to exclude Gmail from the monitoring process, for example.
The company is running a pilot site in South Africa and is expanding its reach in the region. Currently, local companies offering the Teramind solution include Telecommunications Solutions (firstname.lastname@example.org) and infoGuardian (email@example.com)
- Authlogics appoints AxizWorkgroup as a distributor in Africa
February 2017, News, Cyber Security, IT infrastructure
Multi-factor authentication company Authlogics has announced that AxizWorkgroup is its first local distributor and will deliver authentication solutions to resellers in Africa.
- Integrated infrastructure solution for financial services firm
February 2017, BT-SA, Integrated Solutions, IT infrastructure
BT-SA recently completed the installation of an all-inclusive infrastructure solution for a major client’s new administration building and workshop.
- Eyes open in the bus
February 2017, Hikvision South Africa, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Products
Rosario, Argentina has undertaken a citizen-focused security project to implement surveillance cameras on public buses.
- Wireless policing in Namibia
February 2017, RADWIN, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Police replace Wi-Fi network with Radwin’s wireless broadband access solutions to ensure highest quality video surveillance transmission.
- South African smart cities
February 2017, RADWIN, Integrated Solutions, IT infrastructure
When one thinks of smart cities, one might be forgiven for overlooking Africa, but not for much longer as the technology is in play and expanding rapidly.
- Protection from ransomware
February 2017, Cyber Security, IT infrastructure
With some careful preparation, you can significantly lower your risk of being infected by ransomware, and reduce the impact if you are hit.
- Defining African communications
February 2017, Technews Publishing, Cyber Security, IT infrastructure
Hi-Tech Security Solutions was present at AfricaCom to witness the vast resources being poured into improving the communications capabilities of the continent.
- Control cables with numbered cores
February 2017, Helukabel SA, Products, IT infrastructure
Equipment and machinery installations using the latest cabling technologies can contribute significantly to the ease of installation and overall success of a project.
- Clues are dead
February 2017, News, Cyber Security
Kaspersky Lab’s discovery in 2016 of an APT able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a reliable means of detecting infection.
- Tough with opportunities
February 2017, Security & Communication Warehouse, CCTV, Surveillance & Remote Monitoring, Cyber Security
Marius Stoop looks at what we can expect in the security industry in 2017.
- Cyber security in 2017
February 2017, Cyber Security
Harish Chib, VP MEA for SOPHOS discusses some of the cyber security issues he expects to encounter in 2017.
- Security versus convenient access
November 2016, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
As digital interactions increase in volume and complexity, identity and access security have become more critical for both the organisation and end-user.