South Africa underestimates insiders threats

Access & Identity Management Handbook 2011 Access Control & Identity Management

Evil hackers are not your biggest threat, trusted insiders are.

As many as 71% of South African companies have discovered cases of fraud committed by their own employees over the last few years. This startling statistic was uncovered in the first Insider Threat survey, sponsored by Magix Integration.

The survey was conducted to investigate the level of awareness of insider threats in South African businesses and to determine how prepared organisations are to mitigate these risks. The results show that, while awareness of the threats posed by trusted people within organisations was growing, few companies are in a position to effectively protect their systems and data.

“For example, only 38% of the respondent companies have a data leakage prevention (DLP) strategy and deployment in place,” says Hedley Hurwitz, MD of Magix Integration. “This is after 10% admitted they had suffered financial loss due to abuse of infrastructure, databases or applications.

“Magix views risk as arising out of vulnerabilities in three categories, infrastructure, data and user behaviour. There are two lines of attack on these vulnerabilities, those from outside and those from within. We assert that all threats result from weaknesses on the inside because the outside attack is only an attempt to gain access to the organisation. Once access is gained, the outsider becomes an insider and can exploit the same internal vulnerabilities as trusted employees.”

No monitoring

The survey also found that 42% have no mechanism for monitoring users and only 15% have a reliable software inventory mechanism to prevent malicious and unlicensed software from being installed on corporate systems.

Looking further into the results, 45% of companies do not monitor database access and vulnerabilities, leaving sensitive information open to abuse and theft. Finally, in an age where mobile devices that can hold gigabytes of information are small and easily concealed, only 38% of companies ensure data transferred to removable disks is encrypted, while only 14% are able to detect if unauthorised devices are attached to the corporate network.

Despite the availability of solutions to protect infrastructure and data, too many companies are still leaving confidential information at risk. Not only can companies lose their customer and sales-lead information, but also their pricing strategies and future plans, putting the future of the organisation at risk.

“The results are more surprising when considering governance and compliance legislation,” adds Hurwitz. “Failing to protect data can result in breaches of the King III principles, the Companies Act and the soon to be legislated Protection of Personal Information Act. The results are not embarrassment or a slap on the wrist, but can be hefty fines and even incarceration for directors.”

Hedley Hurwitz, MD, Magix Integration
Hedley Hurwitz, MD, Magix Integration

For more information contact Magix Integration, +27 (0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...