Keeping data secure

April 2014 Information Security

With the ongoing trend to move data offsite on mobile devices, can we truly find ways of ensuring that this data is secure from prying hands and eyes? And is data security for mobile devices different from that for supposedly office- or home-bound data?

Richard Broeke, sales manager at Securicom.
Richard Broeke, sales manager at Securicom.

Richard Broeke, sales manager at Securicom, points out that in the past data stayed behind in the building when the employees left the office. However, with the advent of mobile devices, data is no longer in a controlled environment. The crux is knowing exactly where the data is and how access to it can be controlled.

Carey van Vlaanderen, CEO of ESET Southern Africa.
Carey van Vlaanderen, CEO of ESET Southern Africa.

Carey van Vlaanderen, CEO of ESET Southern Africa says that a regular issue they encounter in the market is the lackadaisical approach to corporate user domain policies, giving employees free rein to browse without restriction, as well as download and install software without informing the IT administrator. When this is coupled with poor user awareness, constant use of weak passwords and accessing corporate data from public Wi-Fi networks, companies are placing their client’s and corporate data at risk on a daily basis.

Gareth Tudor, CEO of Altonet.
Gareth Tudor, CEO of Altonet.

Gareth Tudor, CEO of Altonet, says that the data on servers is normally well protected by anti-virus software and firewalls. Therefore, the focus for companies needs to be on the mobile data.

Van Vlaanderen believes that two factor authentication (2FA) goes a long way towards combating user negligence, by removing the need for a poor password and replacing it with a unique one time password (OTP) which is generated each time data is accessed. This ensures that sensitive information can be accessed securely when working remotely and across various devices. Another level to this is the ability to encrypt data when sending information externally, and being able to decrypt the information once received, opened and stored. ESET provides security in all three of these areas: secure authentication, encryption and mobile security.

Tudor says that typically, locking devices automatically after a predetermined period of inactivity will provide a desirable level of protection for mobile device users. In essence, activation will require the use of either a password or a biometric, or preferably a combination of both. Passwords, he believes should be the last choice since most passwords can be hacked. Sadly, most users only decide to implement security measures once an incident has occurred.

What should be protected?

Often companies debate the issue of what should be deemed sensitive data. While vulnerable data varies from one organisation to another, most companies should protect that data that makes them stand out from their competition: their intellectual property.

Tudor says that any personal data is vulnerable and any company information that could cause harm to the company or other individuals when used for egregious purposes.

According to Van Vlaanderen, companies are required to protect any personally identifiable information (PII) of data subjects or juristic entities. They should also protect the systems that process this information. As a starting point, companies should perform an assessment of the way that they currently gather, secure and process personally identifiable information. If an organisation collects or requests personal information, that is, name, surname, address or even email address, it has to be processed and stored with care. For most businesses this could be a daunting requirement, but there are organisations that assist companies with this process.

She explains that to protect this data one should ensure that the systems that one uses should implement technical controls like encryption and organisational controls like identity and access management to ensure that only systems or individuals who are permitted to process the information are doing so.

Tudor believes that a complete lockdown of the system is essential to protect vulnerable data. Data is identified as such by the user and the parameters for its protection are also determined on an individual basis. However, all mobile devices should be subject to this form of control should they contain sensitive data; there should be no exceptions. In addition, any encryption should be applicable to a specific file, irrespective of whether it is loaded on an office system or a mobile device, including memory sticks.

Managing security

Broeke says that in order to ensure the success of a data security system, companies need to devise and thoroughly implement and monitor a mobile management programme. This strategy provides rules on where data can be moved to and how to access and store it correctly. Rules for infringement procedures should also be carefully explained to all data users. A third party specialist could be used to manage this service, thus eliminating the issues that arise from lack of updating of software and devices, and monitoring of the same.

The real risks to companies are a loss of reputation, client confidence and business through inadvertent loss of data. Additionally, malicious intent by disgruntled employees or external parties are threats to businesses today. Amazingly, some smaller companies do not believe they are at risk and therefore do not take precautionary measures. Mobility provides even greater risk than in the old, traditional space.

Information in the hands of unauthorised people induces a risk to personal self, opening companies and individuals up to blackmail, and the very real risk of confidential information being leaked – to the media, for example.

Data is nefariously acquired through the adoption of mobile devices and the ability to bring your own device (BYOD). Data that sits on unmanaged endpoints is the most susceptible to compromise and loss, says Van Vlaanderen. Security is of utmost importance when it comes to dealing with sensitive personal and corporate data. Companies must consider a multi-layer security strategy that duly protects PII, but also accounts for employee negligence. All too often external threats stem from the consistent use of weak passwords, unsecured networks and poor levels of access authorisation.

Cyber criminals are one step ahead of the average citizen, while they are usually only one step, or even closer, behind the technical boffins employed to reduce or eliminate risks. The use of malware and phishing is commonplace and poses a great threat.

Cold boot attacks occur when power to a device is cycled off and then on without letting the operating system shut down cleanly, or, if available, by pressing the reset button. A removable disk with a special boot sector is then immediately booted (for example, from a USB flash drive), and used to dump the contents of pre-boot memory to a file. This method has been demonstrated to be effective against full disk encryption schemes of various vendors and operating systems, even where a trusted platform module (TPM) secure cryptoprocessor is used.

One should not discount the insidiousness of insider attack. While the majority of security breaches are actually unintentional, there are still many instances of employees stealing data or forwarding it on to a third party.

The PoPI effect

Van Vlaanderen states that the PoPI (Protection of Personal Information) Act mandates that organisations should take all reasonable technology and operational steps to ensure the personally identifiable information (PII) that it holds or processes on a data subject is kept secure. This can take the form of encryption, conditional access and obfuscation.

Broeke adds that companies should always be aware of when a breach has occurred and then immediately notify the parties concerned. He believes that most companies that run ethical operations are already aligned with the outlines of the PoPI Act.

Van Vlaanderen provides a succinct summary of the main issue at hand. The use of mobile devices is one of the largest headaches for organisations. Users tend to demand that they have access to corporate systems when on the move and with this requirement becoming more prevalent, IT departments are facing challenges that are difficult to overcome. Having data on a mobile is as much a threat as having it in an unsecured network, due to the increase of mobile malware on unmanaged mobile devices or on the corporate network.

Simply hoping that you are unaffected because your employees are apparently trustworthy or assuming that because your business is an SME, is foolhardy. Data security is critical for anyone who places potentially vulnerable or harmful information on any device, whether it is mobile or seemingly immobile.

Contacts

Carey van Vlaanderen, ESET Southern Africa, 0860 373 872.

Gareth Tudor, Altonet, +27 (0)10 500 1500.

Richard Broeke, Securicom, 086 1591 591.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...