Protecting your customers’ data

1 October 2019 Training & Education, Security Services & Risk Management


Simon Murrell

While customers may be taking precautions to safeguard their personal information and verify the companies they provide personal information to, they are entrusting organisations with their details and expect them to have measures in place to ensure that their data remains secure. However, according to the World Wide Worx State of Enterprise Security in South Africa 2019 study that was conducted in association with Trend Micro and VMware, only 35% of South African IT decision-makers were prepared for cyber-attacks at any time in the next 48 hours. Companies need to take action and have processes in place that not only protect their customer’s details but also provide their customers with tools to help prevent them from falling for phishing scams or spoofing emails for example.

Email verification tools

Email spoofing occurs when recipients receive emails that resemble official organisation emails. For example, a client may receive an email that appears to be sent from his bank with the corporate logo and similar distinct graphics that have been sourced online or copied from legitimate emails sent from the organisation previously. These images are embedded into spoof emails to convince recipients that the emails are legitimate and encourage them to follow specific phishing instructions.

However, email spoofs are not only sent to customers, there are instances where emails appear to be sent from internal sources to company departments and employees with particular instructions. These include instructions that request immediate payment of funds or for funds to be released or even requesting particular customer details. Without the necessary verification tools in place, these emails are often actioned with immediate effect.

With approximately 93 percent of malware coming from emails[4] it is evident that companies lack mechanisms for email authentication. These emails often look legitimate at quick glance and as such the recipient is likely to action it as per the instructions included. To overcome this, company email signatures should aid in enhancing security. This could include providing recipients with a verification page that provides additional information about senders, qualifications, titles, and details about the company.

The details included on the verification should be approved by various departments within the organisation to ensure that the job title and qualification for example, are accurate. In addition as email correspondence can constitute a legal document, the organisation should put measures in place to ensure that all emails that leave the company authenticate the identity of the sender on behalf of the organisation.

By adopting these security measures, companies would provide added peace of mind to their customers that emails they receive from the organisation are authentic.

Securing company templates

Looking beyond email signatures, companies need to put measures in place to secure company documents and templates from third parties. This includes removing former employees from systems and limiting the access vendors and other external parties have to company documents. For example, if important documents such as company letterheads are easily accessed via an unsecure platform, anyone could use the document to spoof recipients into providing valuable personal data or releasing funds.

For added security, company documents and templates should be housed centrally on a cloud platform that restricts usage to only those departments and individuals that need access to these documents. In addition employees should not be able to save company documents to their desktops for future use as these can be easily tampered with or shared with employees that do not need access to them.

Companies should incorporate a tracking system that provides line of site of who is accessing documents and when, as well as providing executives with statistics of user template compliance at any point in time.

This is supported by Varonis which states that fewer people should be able to access to sensitive company information as some of the biggest data breaches in the past year stem from a user who had access to files they shouldn’t have been able to see in the first place [5]. In addition they found that on average, only 3% of company folders are secured leaving employees open access to the majority of company documents and customer information.

Protection from the inside out

In many instances, companies have invested significantly into improving IT security with firewalls and antivirus and antimalware software, however, internal security measures have fallen through the cracks.

In some instances companies rely on third party organisations for email branding to be applied in the form of banners and email signatures which are applied after the email has been sent from the sender. By intercepting these emails, the emails are effectively tampered with and could put customer data at risk. It also poses questions about email authenticity which is key to establishing trust with customers.

Identity theft can occur by neglecting to cancel former employee access to documents. When employees leave an organisation, their access to company documents and systems should be removed from the system immediately and any storage of documentation on the workstation should immediately be flushed. According to Varonis 34% of company user accounts are stale but enabled and 64% of user accounts are stale or inactive. This opens up additional opportunities for identity theft and gives hackers access to useful information that could go easily unnoticed for an extended period of time. As stated by Varonis, “if you’ve got outdated users with active accounts, it’s like handing over a new set of papers to your hacker.”

Giving employees’ access to locked content that cannot be tampered with, provides additional security for customers. This practice reduces the risk of employees and third parties from altering the content and minimises the possibility of intentional and unintentional sabotage from employees. It also adds a layer of authenticity to the email, giving recipients added peace of mind that the content is authentic.

Putting the basics in place

While protecting customer and company data is a huge task, most companies have already started putting measures in place to minimise the risk of data breaches and identity theft. However, in order to provide holistic protection, they need to pay attention to basic requirements that can go a long way to adding a layer of protection to both the company and its customers.

Companies would benefit from building compliance standards into company documentation and emails, adding additional verification measures into emails and limiting access to specific documentation can all go a long way to helping to minimise threats and taking security to a higher level.

BrandQuantum develops software solutions to help companies deliver compliant customer communications and documents. The tamperproof email signatures that are sent out with every single email via Microsoft Outlook have built in verification tools to give customers added peace of mind that your company emails are authentic. The BrandOffice solution offers permission control to company documents so that only those employees that need access to your documents have it. In addition access to company documentation and templates is tracked and audited to give companies line of site of document usage and overall documentation compliance.

For more information, contact BrandQuantum at www.brandquantum.com

[1] www.securitymagazine.com/articles/90394-identity-theft-and-cyber-fraud-in-the-uk-hit-all-time-igh

[2] www.transunion.co.za/archives-article/your-identity-can-be-stolen

[3] www.banking.org.za/consumer-information/bank-crime/identity-personal-information-fraud

[4] www.varonis.com/blog/data-breach-statistics/

[5] www.varonis.com/2018-data-risk-report/

www.brandquantum.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
Tips and tools for trade businesses
News & Events Training & Education
ServCraft brings together trade industry associations and corporations to launch blox, a digital content platform and community impacting lives, businesses and industries across hundreds of thousands of trade business SMEs.

Read more...
Africa Online Safety Platform launched in SA
Training & Education News & Events
Impact Amplifier, with the financial support of Google.org, launched its African Online Safety Platform (AOSP), a platform providing a rich repository of research, education content, funding opportunities and ways to seek help after an online crime.

Read more...