Data, not hardware, is a company's most valuable asset

March/April 2000 Cyber Security

During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.

Just another South African crime statistic, one may ask?

"No, almost certainly not," says Ian Melamed of Ian Melamed Secure Computing. "What made these burglaries significant was the fact that in each of the cases, the company computer file servers holding all the data files were stolen.

"Whenever we lose hardware, we automatically assume the person who is stealing it, is doing so for the hardware itself," Melamed says. "It is only when you start putting a series of thefts together, that it starts looking sinister."

Information theft

"The most probable motive behind these crimes is information theft", he says. "Information theft has already reared its head in several spectacular incidents in South Africa. Data stolen from a computer in Cape Town was used in a blackmail attempt against an AIDS sufferer," Melamed continues.

"The unfortunate victim had regular sums of money demanded from him in exchange for his employer not being informed of his condition. In other cases, the theft of information in respect of employee versus employer disputes has become a regular occurrence".

Although hardware theft is nothing new - either here or overseas - very often the theft of a workstation or smaller equipment goes unreported because the replacement value falls within the insurance excess of company.

"The theft of file servers is however, a different kettle of fish," Melamed says. "File servers and networks which are stolen usually exceed an insurance excess by thousands and thus they are reported. Too often the emphasis is placed on the value of the hardware being stolen and not upon the data that might be found - and used - on the system.

"The question arises, if lawyers' offices are being targeted, then who is next on the list? Accountants? Medical surgeries? The recent thefts seem to indicate the criminal activity of information theft which is already prevalent in foreign countries, has now spread its tentacles into South African society as well," says Melamed.

Information is a resource like money, labour and materials. Unfortunately, this is often realised only after the loss has occurred and the value of data is hard to assess because on the face of it, it is not perceived to be a tangible physical asset.

"It can be compared to buying a R2000 safe and then putting a R2 million necklace into it for safekeeping," Melamed says. "The loss of data, quite apart from the disruptive effect on normal operations, can cause severe embarrassment and provide opportunities for extortion. If equipment is stolen, it is the duty of the system owner to ensure that no clients are exposed to any sort of danger as a result."

Quite apart from the very real danger of sensitive information falling into the wrong hands, there is also a possibility that an aggrieved party might hold the theft victim responsible in a civil claim for any damages caused.

For two reasons then, data can be a company's Achilles Heel if it is not protected properly.

So how can a company protect itself and its clients?

"All companies holding potentially sensitive data should - for their own and their clients' sake - ensure that data is protected through either direct encryption; physical disk disablement; back-up systems; or anti-virus protection," says Melamed.

"Direct encryption means the use of an internal facility which encrypts individual documents as they are created," he says. "Physical disk disablement works much like a time delay lock on the safe at a bank. The disk can only be accessed during normal office hours and even if the disk is physically stolen, it will be useless without the access code.

"A suitable back-up system will ensure that encrypted data which is on a stolen disk, can be recovered, while anti-virus protection will ensure that the system not fall prey to digital burglary through unauthorised backdoor e-mailing of data," Melamed says.

For details contact Ian Melamed, MD of Ian Melamed Secure Computing on cell: 082 444 3661 or e-mail: [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Defining the resilience of cybersecurity
Cyber Security Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

How to stay cybersafe on business trips
Cyber Security
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

How safe are your backups?
Technews Publishing Cyber Security
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Growing cyber resilience portfolio
Technews Publishing Cyber Security
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Adopting a cyber-secure mindset
Security Services & Risk Management Cyber Security
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Reversing the hidden risk of permission creep
Cyber Security
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Mitigating the risk of zero-day attacks against Microsoft 365
J2 Software Cyber Security
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.