It is what is inside

1 June 2012 Information Security

Fraud is a growing concern in corporate South Africa, assisted by the economic downturn and the growing use of technology in all spheres of life. The PwC Global Economic Crime Survey from November 2011 confirms this, finding “economic crime continues to be a serious issue affecting South African organisations”.

The survey also noted that cybercrime has emerged as a ‘significant contributor’ to losses and is now the ‘fourth most common economic crime in South Africa and globally’.

Another recent study by the Centre for the Study of Financial Innovation (CSFI), in association with PwC, found that companies have to increase investments in technology to defend against fraudulent activity, both from within and external to the organisations.

An unsettling comment in the CSFI report states, “We have seen an alarming shift in the perpetrator profile towards senior management. This is also reflected in the types of economic crime that are being committed.”

Threats from inside

“This shift is alarming because senior staff are usually more trusted and given access to more privileges,” says Phillip Gerber, MD of Magix Security. “Not only do these people have easier access to sensitive systems and data, they often have access to funds and data and the means to steal them.”

Phillip Gerber, MD of Magix Security
Phillip Gerber, MD of Magix Security

Gerber notes that although syndicates play a major role in economic crimes, they are not always to blame. “The fact is, fraud within companies has some sort of insider involvement. In most instances the crime goes unseen until someone notices that money is missing.”

However, it is not always the financial losses that hurt businesses the most. PwC notes: “South African respondents report a significantly higher impact of non-financial consequences of economic crime than their global counterparts.” Sometimes fraud has a prolonged effect on the business, in the form of loss of trust and brand damage long after the case is closed.

Results from a recent ITWeb Insider Threat Survey, sponsored by Magix Security found that as many as 71% of South African companies had discovered cases of fraud committed by their own employees over the last few years.

The survey was conducted to investigate the level of awareness of insider threats in South African businesses and to determine how prepared organisations are to mitigate these risks. The results showed that, while awareness of the threats posed by trusted people within organisations was growing, few companies are in a position to effectively protect their systems and data.

Technology the key

The only effective way to manage this situation is to continually monitor what employees are doing. With technology, all activities can be monitored invisibly, in real-time and any anomalous behaviour flagged. Magix Security is helping a number of South African clients tackle internal threats from unscrupulous employees. The company has deployed a specialised software solution called Intellinx at a number of sites across the country.

Intellinx is a software product that tracks end-user activity on almost any platform, without creating additional overhead on systems or requiring the installation of hardware or software on the host or client machines. The product gives management the ability to record the interaction of end users with all applications, zoom-in on specific suspicious activity and replay every screen accessed and every keystroke within an application.

The Intellinx business rule engine tracks end-user behaviour patterns triggering alerts on suspicious events in real-time. Gerber notes that this type of monitoring must be done as part of the corporate security policy to ensure it has the desired effect. “An ad-hoc approach will not get the results required.”

In fact, the Magix Security ITWeb Insider Threat Survey found that 42% of companies have no mechanism for monitoring users and only 15% have a reliable software inventory mechanism to prevent malicious and unlicensed software from being installed on corporate systems.

The Ernst & Young 11th Global Fraud Survey found: “Despite the increased incidents of fraud, corporate entities’ responses to fraud allegations appear to be ad hoc and inconsistent. ... It is our experience that this will seriously undermine the success of investigations into fraud and corruption.”

“More than ever, companies need to accept that fraud in all its forms is a reality and will increase along with the global economic problems,” says Gerber. “Furthermore, you cannot rely on people’s honesty to prevent fraud, but must be proactive in identifying and preventing crime before it is able to impact the organisation.

“Automated monitoring is an effective way to prevent fraud as many people are inclined to think twice when they know they are being watched. Those that still proceed will have their work cut out for them as their plans will be thwarted at the first sign of unusual or unauthorised behaviour.”

For more information contact Magix Security, +27 (0)11 258 4442, [email protected], www.magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...