It is what is inside

1 June 2012 Information Security

Fraud is a growing concern in corporate South Africa, assisted by the economic downturn and the growing use of technology in all spheres of life. The PwC Global Economic Crime Survey from November 2011 confirms this, finding “economic crime continues to be a serious issue affecting South African organisations”.

The survey also noted that cybercrime has emerged as a ‘significant contributor’ to losses and is now the ‘fourth most common economic crime in South Africa and globally’.

Another recent study by the Centre for the Study of Financial Innovation (CSFI), in association with PwC, found that companies have to increase investments in technology to defend against fraudulent activity, both from within and external to the organisations.

An unsettling comment in the CSFI report states, “We have seen an alarming shift in the perpetrator profile towards senior management. This is also reflected in the types of economic crime that are being committed.”

Threats from inside

“This shift is alarming because senior staff are usually more trusted and given access to more privileges,” says Phillip Gerber, MD of Magix Security. “Not only do these people have easier access to sensitive systems and data, they often have access to funds and data and the means to steal them.”

Phillip Gerber, MD of Magix Security
Phillip Gerber, MD of Magix Security

Gerber notes that although syndicates play a major role in economic crimes, they are not always to blame. “The fact is, fraud within companies has some sort of insider involvement. In most instances the crime goes unseen until someone notices that money is missing.”

However, it is not always the financial losses that hurt businesses the most. PwC notes: “South African respondents report a significantly higher impact of non-financial consequences of economic crime than their global counterparts.” Sometimes fraud has a prolonged effect on the business, in the form of loss of trust and brand damage long after the case is closed.

Results from a recent ITWeb Insider Threat Survey, sponsored by Magix Security found that as many as 71% of South African companies had discovered cases of fraud committed by their own employees over the last few years.

The survey was conducted to investigate the level of awareness of insider threats in South African businesses and to determine how prepared organisations are to mitigate these risks. The results showed that, while awareness of the threats posed by trusted people within organisations was growing, few companies are in a position to effectively protect their systems and data.

Technology the key

The only effective way to manage this situation is to continually monitor what employees are doing. With technology, all activities can be monitored invisibly, in real-time and any anomalous behaviour flagged. Magix Security is helping a number of South African clients tackle internal threats from unscrupulous employees. The company has deployed a specialised software solution called Intellinx at a number of sites across the country.

Intellinx is a software product that tracks end-user activity on almost any platform, without creating additional overhead on systems or requiring the installation of hardware or software on the host or client machines. The product gives management the ability to record the interaction of end users with all applications, zoom-in on specific suspicious activity and replay every screen accessed and every keystroke within an application.

The Intellinx business rule engine tracks end-user behaviour patterns triggering alerts on suspicious events in real-time. Gerber notes that this type of monitoring must be done as part of the corporate security policy to ensure it has the desired effect. “An ad-hoc approach will not get the results required.”

In fact, the Magix Security ITWeb Insider Threat Survey found that 42% of companies have no mechanism for monitoring users and only 15% have a reliable software inventory mechanism to prevent malicious and unlicensed software from being installed on corporate systems.

The Ernst & Young 11th Global Fraud Survey found: “Despite the increased incidents of fraud, corporate entities’ responses to fraud allegations appear to be ad hoc and inconsistent. ... It is our experience that this will seriously undermine the success of investigations into fraud and corruption.”

“More than ever, companies need to accept that fraud in all its forms is a reality and will increase along with the global economic problems,” says Gerber. “Furthermore, you cannot rely on people’s honesty to prevent fraud, but must be proactive in identifying and preventing crime before it is able to impact the organisation.

“Automated monitoring is an effective way to prevent fraud as many people are inclined to think twice when they know they are being watched. Those that still proceed will have their work cut out for them as their plans will be thwarted at the first sign of unusual or unauthorised behaviour.”

For more information contact Magix Security, +27 (0)11 258 4442, [email protected], www.magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.