Keeping data secure

April 2014 Information Security

With the ongoing trend to move data offsite on mobile devices, can we truly find ways of ensuring that this data is secure from prying hands and eyes? And is data security for mobile devices different from that for supposedly office- or home-bound data?

Richard Broeke, sales manager at Securicom.
Richard Broeke, sales manager at Securicom.

Richard Broeke, sales manager at Securicom, points out that in the past data stayed behind in the building when the employees left the office. However, with the advent of mobile devices, data is no longer in a controlled environment. The crux is knowing exactly where the data is and how access to it can be controlled.

Carey van Vlaanderen, CEO of ESET Southern Africa.
Carey van Vlaanderen, CEO of ESET Southern Africa.

Carey van Vlaanderen, CEO of ESET Southern Africa says that a regular issue they encounter in the market is the lackadaisical approach to corporate user domain policies, giving employees free rein to browse without restriction, as well as download and install software without informing the IT administrator. When this is coupled with poor user awareness, constant use of weak passwords and accessing corporate data from public Wi-Fi networks, companies are placing their client’s and corporate data at risk on a daily basis.

Gareth Tudor, CEO of Altonet.
Gareth Tudor, CEO of Altonet.

Gareth Tudor, CEO of Altonet, says that the data on servers is normally well protected by anti-virus software and firewalls. Therefore, the focus for companies needs to be on the mobile data.

Van Vlaanderen believes that two factor authentication (2FA) goes a long way towards combating user negligence, by removing the need for a poor password and replacing it with a unique one time password (OTP) which is generated each time data is accessed. This ensures that sensitive information can be accessed securely when working remotely and across various devices. Another level to this is the ability to encrypt data when sending information externally, and being able to decrypt the information once received, opened and stored. ESET provides security in all three of these areas: secure authentication, encryption and mobile security.

Tudor says that typically, locking devices automatically after a predetermined period of inactivity will provide a desirable level of protection for mobile device users. In essence, activation will require the use of either a password or a biometric, or preferably a combination of both. Passwords, he believes should be the last choice since most passwords can be hacked. Sadly, most users only decide to implement security measures once an incident has occurred.

What should be protected?

Often companies debate the issue of what should be deemed sensitive data. While vulnerable data varies from one organisation to another, most companies should protect that data that makes them stand out from their competition: their intellectual property.

Tudor says that any personal data is vulnerable and any company information that could cause harm to the company or other individuals when used for egregious purposes.

According to Van Vlaanderen, companies are required to protect any personally identifiable information (PII) of data subjects or juristic entities. They should also protect the systems that process this information. As a starting point, companies should perform an assessment of the way that they currently gather, secure and process personally identifiable information. If an organisation collects or requests personal information, that is, name, surname, address or even email address, it has to be processed and stored with care. For most businesses this could be a daunting requirement, but there are organisations that assist companies with this process.

She explains that to protect this data one should ensure that the systems that one uses should implement technical controls like encryption and organisational controls like identity and access management to ensure that only systems or individuals who are permitted to process the information are doing so.

Tudor believes that a complete lockdown of the system is essential to protect vulnerable data. Data is identified as such by the user and the parameters for its protection are also determined on an individual basis. However, all mobile devices should be subject to this form of control should they contain sensitive data; there should be no exceptions. In addition, any encryption should be applicable to a specific file, irrespective of whether it is loaded on an office system or a mobile device, including memory sticks.

Managing security

Broeke says that in order to ensure the success of a data security system, companies need to devise and thoroughly implement and monitor a mobile management programme. This strategy provides rules on where data can be moved to and how to access and store it correctly. Rules for infringement procedures should also be carefully explained to all data users. A third party specialist could be used to manage this service, thus eliminating the issues that arise from lack of updating of software and devices, and monitoring of the same.

The real risks to companies are a loss of reputation, client confidence and business through inadvertent loss of data. Additionally, malicious intent by disgruntled employees or external parties are threats to businesses today. Amazingly, some smaller companies do not believe they are at risk and therefore do not take precautionary measures. Mobility provides even greater risk than in the old, traditional space.

Information in the hands of unauthorised people induces a risk to personal self, opening companies and individuals up to blackmail, and the very real risk of confidential information being leaked – to the media, for example.

Data is nefariously acquired through the adoption of mobile devices and the ability to bring your own device (BYOD). Data that sits on unmanaged endpoints is the most susceptible to compromise and loss, says Van Vlaanderen. Security is of utmost importance when it comes to dealing with sensitive personal and corporate data. Companies must consider a multi-layer security strategy that duly protects PII, but also accounts for employee negligence. All too often external threats stem from the consistent use of weak passwords, unsecured networks and poor levels of access authorisation.

Cyber criminals are one step ahead of the average citizen, while they are usually only one step, or even closer, behind the technical boffins employed to reduce or eliminate risks. The use of malware and phishing is commonplace and poses a great threat.

Cold boot attacks occur when power to a device is cycled off and then on without letting the operating system shut down cleanly, or, if available, by pressing the reset button. A removable disk with a special boot sector is then immediately booted (for example, from a USB flash drive), and used to dump the contents of pre-boot memory to a file. This method has been demonstrated to be effective against full disk encryption schemes of various vendors and operating systems, even where a trusted platform module (TPM) secure cryptoprocessor is used.

One should not discount the insidiousness of insider attack. While the majority of security breaches are actually unintentional, there are still many instances of employees stealing data or forwarding it on to a third party.

The PoPI effect

Van Vlaanderen states that the PoPI (Protection of Personal Information) Act mandates that organisations should take all reasonable technology and operational steps to ensure the personally identifiable information (PII) that it holds or processes on a data subject is kept secure. This can take the form of encryption, conditional access and obfuscation.

Broeke adds that companies should always be aware of when a breach has occurred and then immediately notify the parties concerned. He believes that most companies that run ethical operations are already aligned with the outlines of the PoPI Act.

Van Vlaanderen provides a succinct summary of the main issue at hand. The use of mobile devices is one of the largest headaches for organisations. Users tend to demand that they have access to corporate systems when on the move and with this requirement becoming more prevalent, IT departments are facing challenges that are difficult to overcome. Having data on a mobile is as much a threat as having it in an unsecured network, due to the increase of mobile malware on unmanaged mobile devices or on the corporate network.

Simply hoping that you are unaffected because your employees are apparently trustworthy or assuming that because your business is an SME, is foolhardy. Data security is critical for anyone who places potentially vulnerable or harmful information on any device, whether it is mobile or seemingly immobile.

Contacts

Carey van Vlaanderen, ESET Southern Africa, 0860 373 872.

Gareth Tudor, Altonet, +27 (0)10 500 1500.

Richard Broeke, Securicom, 086 1591 591.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.