Identity theft R us

November 2017 News & Events

There are some people in South Africa thanking whoever they see fit to thank that the government has bumbled to implementation of the PoPI Act for so long. You will have heard about the clever people who exposed personal information, including ID numbers and more of over 30 million South Africans. If PoPI was in effect (and, of course, if it was enforced) these clowns could have been facing millions in fines and perhaps even jail time.

Fortunately for them, cybersecurity at a national level can best be described as “leaves a lot to be desired”. But let’s not point fingers at the government, perhaps we should be asking how anyone with an ounce of common sense would leave such sensitive information at the mercy of criminals? Were they stupid? Were they careless? Were they naïve? Were they just so greedy to make a buck off this information they got from somewhere that they couldn’t be bothered to secure it?

The “IT people” are probably going to get the blame for his/her/their incompetence, and rightly so. But how can a director of a company in this day and age not pay any attention to ensuring sensitive information is secure? The information stolen could be used for a number of criminal acts in your name, and my name.

Perhaps it’s just a case of not caring because they know there is not much that can be done in terms of legal action against them – unless some class action complaint is initiated (but what’s the chance of that)?

The only relevant question now is: what can each of us do to try to protect ourselves in light of this criminal act?

Access & Identity Management Handbook 2018

On a lighter note, the Access & Identity Management Handbook has just been published with over 100 pages of information about access control and identity management in these troubled times. Ironically, one of the focus areas of the handbook is trust. How do you determine the level of trust to assign to various identities? It also includes information on the latest technologies and trends in this market, as well as insight from a variety of access and identity experts. (Cybersecurity also gets a mention.)

If you don’t get your copy in the mail, contact [email protected] and one will be dispatched post haste.

2018 is almost here

Finally, the Hi-Tech Security Solutions team would like to wish all our readers a safe and enjoyable holiday season. May 2018 be a year of miracles and the emergence of some political common sense.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...