From the editor's desk: Take identity seriously

Issue 8 2020 News & Events

The list of companies subject to data breaches continues to grow, both in Africa and beyond. The dangerous part is that in Africa, including South Africa (at the moment), the companies do not have to tell anyone what happened. The only way we (as the real victims of these breaches) find out is when an international body notices millions of records up for grabs on the ‘Dark Web’. (I hate the term Dark Web, it’s really just the Internet with a bit of security.)


Andrew Seldon.

The Protection of Personal Information Act (PoPIA) is meant to deal with this, and I suppose other local cyber or electronic communications laws are also meant to be useful. However, the way I see it, they mainly focus on making sure trusted entities like the government (try saying “trusted entities like the government” without laughing) can check out what sites you have been browsing and who you’re exchanging sweet nothings with on messaging apps.

Now we know that no system can ever be 100% secure, unless it’s switched off and disconnected, but there are solutions for organisations that will help them to make it harder to hack into their systems. Cyber criminals, like any other criminals, will opt for the easy targets rather than doing the hard work unless they know there is good money to be made by taking their time.

And this is where the whole cybersecurity idea falls apart. Most of the breaches we see today are not hacking like in the movies, but the result of carelessness, incompetence or plain old laziness. For example, simply sending millions of records to an individual because he/she/it once logged into your system legitimately; or the all-time favourite, ignoring basic security principles and leaving databases unprotected or using default passwords.

And the people put at risk are you and I. Companies are protected by teams of lawyers and nice insurance policies, which we pay for anyway, but the individuals who have their identities stolen and have to engage in what amounts to a war to get companies and government departments to acknowledge the theft and correct the consequences just get screwed.

I can go on, but what’s the point? We need a new way to protect identities that doesn’t involve trusting companies or cloud services or brokers, agents, sales people and others. The quick solution is to jump on the biometrics bandwagon, but it is more than simply a fingerprint or picture of your face, there needs to be an open ecosystem that holds a secure audit trail of every identity out there – human or otherwise – and makes it secure, simple and fast to confirm an identity.

Easier said than done, but it is possible. I hope to delve a little more into that concept in the upcoming Access & Identity Management Handbook 2021 which we will finish this year (COVID willing), and publish in January 2021. Of course, that all depends on whether people will be willing to speak to me about it. If you have any insights, feel free to get in touch on [email protected].


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...