Identity theft R us

November 2017 News & Events

There are some people in South Africa thanking whoever they see fit to thank that the government has bumbled to implementation of the PoPI Act for so long. You will have heard about the clever people who exposed personal information, including ID numbers and more of over 30 million South Africans. If PoPI was in effect (and, of course, if it was enforced) these clowns could have been facing millions in fines and perhaps even jail time.

Fortunately for them, cybersecurity at a national level can best be described as “leaves a lot to be desired”. But let’s not point fingers at the government, perhaps we should be asking how anyone with an ounce of common sense would leave such sensitive information at the mercy of criminals? Were they stupid? Were they careless? Were they naïve? Were they just so greedy to make a buck off this information they got from somewhere that they couldn’t be bothered to secure it?

The “IT people” are probably going to get the blame for his/her/their incompetence, and rightly so. But how can a director of a company in this day and age not pay any attention to ensuring sensitive information is secure? The information stolen could be used for a number of criminal acts in your name, and my name.

Perhaps it’s just a case of not caring because they know there is not much that can be done in terms of legal action against them – unless some class action complaint is initiated (but what’s the chance of that)?

The only relevant question now is: what can each of us do to try to protect ourselves in light of this criminal act?

Access & Identity Management Handbook 2018

On a lighter note, the Access & Identity Management Handbook has just been published with over 100 pages of information about access control and identity management in these troubled times. Ironically, one of the focus areas of the handbook is trust. How do you determine the level of trust to assign to various identities? It also includes information on the latest technologies and trends in this market, as well as insight from a variety of access and identity experts. (Cybersecurity also gets a mention.)

If you don’t get your copy in the mail, contact vivienne@technews.co.za and one will be dispatched post haste.

2018 is almost here

Finally, the Hi-Tech Security Solutions team would like to wish all our readers a safe and enjoyable holiday season. May 2018 be a year of miracles and the emergence of some political common sense.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...