Subscribe
  • Home
  • /
  • TechForum
  • /
  • King IV sounds wake-up call on insider threat to data security

King IV sounds wake-up call on insider threat to data security

The King IV Report and the imminent announcement of the effective date in terms of the POPI Act provide a wake-up call for South African organisations, says John Mc Loughlin, MD of J2 Software.


Cape Town, 02 Nov 2016

Research by information specialists J2 Software shows that employees pose one of the biggest threats to the security of corporate data - a threat that is largely unrecognised by South African boards. The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November, and the imminent announcement of the effective date in terms of the Protection of Personal Information (POPI) Act by the newly appointed Regulator, provide a wake-up call for South African organisations, says John Mc Loughlin, MD of J2 Software.

"Data is now recognised as the most valuable asset a company owns, and it is the target of criminal syndicates. POPI and similar legislation elsewhere in the world has been devised to force companies to take responsibility for protecting the sensitive personal data they store on their systems. Codes like the King Code have long identified that a company's data is the fuel on which it runs, and have made boards responsible for ensuring it is protected," he explains. "But, all too often the threat is conceptualised as external, and the solution as purely technological. What they fail to recognise and be accountable for is that their employees represent an equally serious security risk."

McLoughlin says that while there is no doubt that syndicates target employees to buy corporate information, an equal cause for concern is the fact that many corporate end-users create vulnerability inadvertently, simply by mishandling data or corporate IT assets. A survey conducted by J2 Software of 46 million Windows File, and Application activities and more than 197 000 external USB device insertions found that:

* One in 40 end-users mis-handle sensitive corporate information; 2.5% of the trusted user base represents a direct threat to corporate security.
* Fewer than 1% of businesses encrypt information copied to external USB drives, and even fewer know what has been copied.
* Fewer than 1% of businesses encrypt their users' hard drives.
* 70% of businesses have no control and no visibility on administrative rights across their environments.

"Most, if not all, of these companies will have data-security policies in place but the truth is that they have absolutely no idea what is actually going on with their data," McLoughlin says. "Very often it's motivated employees who are the risk - using Dropbox because it's the only way to get sensitive financial information to the sales director on a business trip in Turkey, for example. But one must also bear in mind that dishonest employees often have access to a lot of sensitive data that can easily be copied onto a hard drive and sold to the highest bidder."

King IV requires companies to "exercise ongoing oversight of the management of information and, in particular, oversee that it results in the continual monitoring of security of information".

"To discharge this responsibility and ensure that the company's information is protected, systems are needed to monitor who is accessing data from inside the company as well as from outsidep - and what they are doing with it," ends McLoughlin.

** King IV, King IV Report on Corporate Governance and King IV Code are all trademarks of the Institute of Directors in Southern Africa.

Share

J2 Software

J2 Software is a dynamic African ICT company founded in 2006 to address the need for effective information security, governance, risk and compliance solutions in the ICT markets' across the continent. It offers globally leading solutions including: Dtex SystemSkan; Mimecast; J2 Online Backup and Simply Secure.

The continued rise of identity theft and confidential data leakage drives the requirement for J2 Software's product offerings - not only for competitive advantage but as an absolute necessity.

It delivers essential tools that empower organisations to take control of their technology spend. Its hand-picked solutions provide complete visibility over its customers' environment while reducing risk and lowering costs.

J2 Software has provided services and solutions to renowned enterprise corporations with sites running in South Africa, Angola, Botswana, Kenya, Malawi, Mauritius, Mozambique, Tanzania, Uganda and Zambia.

Visit the J2 Blog

Twitter: https://twitter.com/j2softwaresa Handle - @J2SoftwareSA
Facebook: https://www.facebook.com/J2Software/
LinkedIn User Group: https://www.linkedin.com/groups/3893947/
LinkedIn Company: https://www.linkedin.com/company/j2-software

Editorial contacts

Deirdre Blain
Blain Communications
(+27) 083 230 5522
blain@iafrica.com
John Mc Loughlin
J2 Software
(+27) 0861 00 5896
john@j2.co.za