Managing identity in the workplace

Access & Identity Management Handbook 2014 Access Control & Identity Management

Accurate identity authentication simply has to be the foundation for accurate identity management. If we can’t positively identify people, then what hope do we have for managing their access and activities?

It may be an inconvenient truth, but the exploitation of traditional access credentials such as cards, PINs and passwords (CPPs) lies at the heart of the routine acts of fraud that happen on a daily basis within the workplace. The reason for this is alarmingly simple: anyone can use your card, your PIN and your password – and you can use theirs. As a barrier to unauthorised access and illicit activity, these conventional credentials are hopelessly inadequate. This is so because they cannot authenticate the identity of their user. In short, they are a flaw at the core of corporate security.

From the persistent losses caused by buddy clocking through to fraudulent EFT payments, the risk of identity-based fraud extends into all the areas in an organisation where there is a requirement for people to use CPPs.

During the past forty or so years, CPPs have come to be accepted in the same way that we accept, say, the strange quirkiness of the Qwerty keyboard. Perhaps an ingrained familiarity with CPPs is partly to blame for a lack of rational assessment of their shortcomings as a modern security measure. That’s not to say that there have not been developments in how CPPs work. Passwords have become more complex and are often automatically changed on a regular basis. They have been linked to personal identity numbers (PINs), and more recently, to one-time PINs and smartcards.

But the flaw at the core endures. Irrespective of their complexity, CPPs are either accepted or rejected based exclusively on their validity, not on the identity of the user. They can never authenticate the identity of their users because their use cannot be restricted to a specific person.

Learning lessons from physical security

Today, thousands of South African organisations are running biometric-based systems that safely, securely and accurately control access to the workplace for well over two million local people. Some of those organisations have gone a step further and integrated biometric access control with their time and attendance and payroll systems.

The straightforward business case for replacing CPPs with biometric-based authentication within such systems is well proven: the technology cuts the repetitive losses caused by unauthorised access and buddy clocking. The migration from CPPs to biometrics has been so extensive that South Africa is now one of the world’s largest and most diverse markets for a form of authentication that recognises people for what they are – people – not a plastic card or a bit of inanimate code.

And yet we have still not seen a large-scale adoption of these authentication methods within digital systems where the risks created by identity-based fraud are of a magnitude far greater than, say, the risks associated with buddy clocking. This would suggest that organisations need to review how identity is authenticated across every aspect of their operations. not just at the front gate and in their payroll management.

Failure to authenticate

The range and scale of the vulnerabilities caused by CPPs is increasing as organisations become more and more reliant on IT systems in their business processes. The increased convenience and efficiency generated by digital systems quite clearly comes hand-in-hand with increased risk arising from inadequate identity controls.

If we can’t authenticate identities within all of our workplace systems, and we certainly can’t with CPPs, how can we securely control what happens within increasingly digitally-based processes? We can’t. It’s as simple as that. Which means that the problem is out of control and getting worse. Failure to Authenticate (FTA) is now a widespread, entrenched problem. Acquiring someone else’s identity credentials is an obvious way for internal and external fraudsters to masquerade as legitimate, authorised users in order to perform activities that appear to be entirely genuine.

A prime example of the consequences of FTA are the repetitive losses incurred as a result of buddy clocking. This particular type of workplace fraud illustrates how the use of other peoples’ credentials makes it so easy to abuse systems whose security depends on identifying users.

Other examples of FTA appear in the media on a regular basis. In January 2012, Postbank was robbed of R42m by insiders who apparently used the access credentials of fellow employees to transfer the funds. A few weeks later, a court found that an employee of FNB had used a keylogger to capture her colleagues’ passwords in order to transfer R27.3 million from a corporate client’s account.

The Bellville Commercial Specialised Court in Cape Town regularly convicts insider fraudsters for making illicit EFT payments. In April this year, a bookkeeper was convicted of transferring over R2 million to her own account over a period of two years. In May, another bookkeeper was convicted of stealing R4.5 million over three years. That money was supposed to be paid to SARS but was transferred to the villain’s account. A credit control manager was convicted in July of making over R1.5 million in fraudulent payments to himself.

And, to keep things right up to date, yet another bookkeeper was convicted in September of transferring over R1.4 million to herself in a 12-month crime spree. It just goes on and on and on.

Dumb users or dumb systems?

There’s an old saying that people are the weakest link in security and that so-called ‘dumb users’ are always the fly in the magic ointment designed to protect corporate systems. But users are not universally stupid and they do not respond well to the imposition of security measures that create obstacles to doing their jobs and strike them as doing almost nothing to protect their IT-based work and the IT-dependent organisations for which they do it.

Ask most users and they will tell you that managing their passwords and PINs comes high on their IT drag list. Press a little harder and they will probably admit to sharing them, writing them down or storing them on their phone. I know of a senior executive at a merchant bank who had 17 different work-related passwords. The discovered fact that he was storing the latest version of each one in a spreadsheet almost cost him his job. Dumb user? I think not.

Corporate governance? What governance?

Governance, risk management and regulatory compliance (GRC) has in the past few years become an important topic on the agendas of many corporate boards. In South Africa, the most influential guidance concerning GRC is The King Code of Governance, the latest version of which is often referred to as King III. As of June 2010, all companies listed on the Johannesburg Stock Exchange must comply with the code.

Amongst many other things, King III requires board members to take overall responsibility for IT governance. Directors must ensure that prudent and reasonable steps have been taken to protect intellectual property, company and client information. Surely the question here is this: can CPPs be regarded as prudent and reasonable steps to safeguard these assets?

Back in 1988, George Tenet, the Director of the CIA, issued this chilling warning about the security of digital systems: “We have built our future upon a capability that we have not learned how to protect. We have ignored the need to build trust into our systems. Simply hoping that someday we can add the needed security before it is too late is not a strategy.”

A quarter of a century later, not much has changed and organisations cannot secure what they cannot control. In terms of identity management, the use of cards, PINs and passwords undermines every initiative to reinforce security within digital systems and the multitude of business processes that are dependent on them.

In terms of developing a strategy for managing identity in the workplace, it is absolutely essential to base it on accurate authentication and then build from there. Simply hoping that nobody will ever again abuse someone else’s card, PIN or password is not a strategy at all.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.