Ten facts senior management likes to keep quiet

September 2009 Security Services & Risk Management

It is always safe to set middle managers the task of safeguarding company assets and secrets since it is only the lower-grade workers that steal. Or is it?

Business leaders and owners are under constant pressure to protect their companies’ assets from external and internal thieves, specifically low-grade workers who are renowned for helping themselves to things that do not belong to them. Sadly, this misconception often saves the company money lost to pilfered stationery, but costs much more when the real thieves strike.

“Middle and senior managers are often assumed to be honest and above suspicion when it comes to the risks of internal theft and fraud,” states Amir Lubashevsky, executive director of Magix Integration. “The opposite is actually true. The biggest threat to business comes from the higher management levels.”

Amir Lubashevsky, executive director, Magix Integration
Amir Lubashevsky, executive director, Magix Integration

Lubashevsky offers the following 10 facts all companies should know about their senior management.

1. Middle and senior management commit most cases of serious fraud because it is so much simpler for them to access the needed information and areas of the business.

2. Senior management can get their hands on sensitive information simply by asking for it. Who is going to refuse to give a senior member of staff the latest accounting data or a list of new customers?

3. Authority figures can simply ask for data without justifying their requests. Who will point out to them that they do not have permission to see or take the data away?

4. Senior managers are more familiar to the outside world and are therefore targets for social engineering swindles.

5. Senior management do not generally have enough technical knowledge to understand the risks they expose the organisation to when using PCs, laptops and mobile technology. Nor do they understand the danger of social engineering and blowing their own trumpets to strangers.

6. Senior managers are forced to trust other 'smart people' to give them the information they need to do their jobs. They generally have no idea of how to verify the accuracy of the information.

7. Due to workloads, managers tend to delegate sensitive work to people who do not understand its importance and can compromise security. Alternatively, they blindly delegate to those with a good understanding of it and are planning to exploit it for personal gain.

8. How many managers have loud, uncensored cellular conversations or access confidential information via laptop in public places, such as airports or restaurants? While they may feel very important, they are also leaking information to anyone in the vicinity.

9. Senior management feel they are too important to suffer restrictions they impose on other people. Their egos expose their organisation to severe security risks by not limiting their access to only what they need.

10. While we think lower ranks are the job hoppers today, senior management jump ship more often than any other level of employee. Moreover, they take large amounts of information with them, some of it very sensitive, with no control over how it is used.

Society tends to assume that managers are above the masses in terms of ethics and trustworthiness. The reality is management has access to valuable information and assets and is there for a target for criminal syndicates as well as its own greed. Failure to implement the appropriate risk mitigation measures to protect a company from senior staff members that give in to temptation will lead to losses, possibly even the loss of the business.

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...