Ten facts senior management likes to keep quiet

September 2009 Security Services & Risk Management

It is always safe to set middle managers the task of safeguarding company assets and secrets since it is only the lower-grade workers that steal. Or is it?

Business leaders and owners are under constant pressure to protect their companies’ assets from external and internal thieves, specifically low-grade workers who are renowned for helping themselves to things that do not belong to them. Sadly, this misconception often saves the company money lost to pilfered stationery, but costs much more when the real thieves strike.

“Middle and senior managers are often assumed to be honest and above suspicion when it comes to the risks of internal theft and fraud,” states Amir Lubashevsky, executive director of Magix Integration. “The opposite is actually true. The biggest threat to business comes from the higher management levels.”

Amir Lubashevsky, executive director, Magix Integration
Amir Lubashevsky, executive director, Magix Integration

Lubashevsky offers the following 10 facts all companies should know about their senior management.

1. Middle and senior management commit most cases of serious fraud because it is so much simpler for them to access the needed information and areas of the business.

2. Senior management can get their hands on sensitive information simply by asking for it. Who is going to refuse to give a senior member of staff the latest accounting data or a list of new customers?

3. Authority figures can simply ask for data without justifying their requests. Who will point out to them that they do not have permission to see or take the data away?

4. Senior managers are more familiar to the outside world and are therefore targets for social engineering swindles.

5. Senior management do not generally have enough technical knowledge to understand the risks they expose the organisation to when using PCs, laptops and mobile technology. Nor do they understand the danger of social engineering and blowing their own trumpets to strangers.

6. Senior managers are forced to trust other 'smart people' to give them the information they need to do their jobs. They generally have no idea of how to verify the accuracy of the information.

7. Due to workloads, managers tend to delegate sensitive work to people who do not understand its importance and can compromise security. Alternatively, they blindly delegate to those with a good understanding of it and are planning to exploit it for personal gain.

8. How many managers have loud, uncensored cellular conversations or access confidential information via laptop in public places, such as airports or restaurants? While they may feel very important, they are also leaking information to anyone in the vicinity.

9. Senior management feel they are too important to suffer restrictions they impose on other people. Their egos expose their organisation to severe security risks by not limiting their access to only what they need.

10. While we think lower ranks are the job hoppers today, senior management jump ship more often than any other level of employee. Moreover, they take large amounts of information with them, some of it very sensitive, with no control over how it is used.

Society tends to assume that managers are above the masses in terms of ethics and trustworthiness. The reality is management has access to valuable information and assets and is there for a target for criminal syndicates as well as its own greed. Failure to implement the appropriate risk mitigation measures to protect a company from senior staff members that give in to temptation will lead to losses, possibly even the loss of the business.

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...