About
Subscribe

Stolen company data for sale

Johannesburg, 15 Feb 2010

The emerging and constantly evolving world of the mobile workforce requires more than just adequate security policies. Information security is a threat that every company must take seriously. This is even more relevant today with new, stricter governance policies and legal requirements.

A security policy alone is no longer good enough to address management's duty to protect the organisation from risk, especially where valuable data, which was once hidden behind closed doors, is now moving around via an ever-growing mobile workforce.

J2 Software managing director John Mc Loughlin warns that valuable business information is fast becoming an irresistible temptation for thieves. “The laptop itself is not the issue, but the disruption to business and the risk to customer information, employee records or sensitive company data is far worse.”

In an effort to reduce the disruption to business that results when mobile working tools are stolen, serious consideration should be given to new and innovative security tools. Minimising the risk of laptop theft should not only be the concern of the IT manager, but also every employee entrusted with mobile computing equipment.

IDC research shows that 92% of SMEs with mobile workers have experienced laptop theft. The average incident in an SME occurs once every 251 days and 54% of SMEs have experienced a laptop theft in the past six months. Laptop theft occurs in a wide range of places, with public transport and hotels being particularly susceptible. The workplace is not immune from theft either, with 26% of IT managers suspecting internal involvement in the theft of laptops and just 35% of office-based theft being the result of a break in. Walk-in theft is almost as likely with 31% of IT managers having experienced it.

Mc Loughlin says the laptop security market has a wide choice of products, from the tried and tested cable locks through to innovative Internet tracking services. “However, does this solve the real issue at hand - data theft. J2 Software has introduced a solution that protects computers and laptops from unauthorised access and also offers free global theft cover.”

The T3 SecurityKey is a security device that ensures instant lockdown, data encryption and covers one against theft, anywhere in the world. It ensures that unauthorised users cannot access one's PC or laptop to view, copy or modify confidential information. With passwords not being a real deterrent, a simple solution such as the T3 SecurityKey adds another layer of protection to keep the unwanted users at bay.

“More importantly, companies should be aware that employees are increasingly stealing data and selling it for self gain. There is an increasing threat of confidential data being removed from the network through the use of removable media devices such as cellular phones, USB flash drives, removable hard disks, PDAs and MP3 players. Many organisations want simple tools to protect the network against security risks and data theft, but they don't realise what is happening with their information outside the building,” he explains.

While most companies do not have the tools to monitor users on the network, it has become critical that access to information is managed and that users are held accountable for their actions. With users being able to access the Internet, send and receive e-mail and browse the local network, often in an unstructured manner, it is crucial that employees are effectively monitored and kept productive without interfering with their usual work patterns.

“Very little consideration has been given to providing solid management systems to ensure that the investment in technology delivers maximum benefit. It is extremely important that executives take corrective steps and ensure there are preventative measures in place for this,” he explains.

He says many organisations are now looking for solutions to cover the obvious gaps in their approach to information security. “The changing requirements of information security are evolving rapidly and these organisations need to find comprehensive, simple-to-use solutions - based on a whole new set of emerging challenges and threats.”

SystemSkan is a total user management tool that provides managers with the ability to view and record every user's actions on the computer network, including Internet and outgoing e-mail attachments. It is used to identify security risks within an organisation, and provides policy enforcement tools to minimise these risks.

It assists in setting the appropriate policy and provides enforcement tools to protect company information. Furthermore, it will greatly increase the efficiency of network management and reduce the cost of administration services within the workplace.

“SystemSkan will track, monitor and control every user activity on the network. It gives you visibility of what is really going on across your network. It is an essential policy enforcement tool to manage networks, knowledge workers and to protect intellectual property. Our clients are enjoying massive savings, lowering their risk, increasing IT governance, aiding compliance and cutting bandwidth usage,” he concludes.

For more information, contact J2 Software on (011) 794 2537 or email john@jtwo.co.za.

Share

J2 Software

J2 Software is a leading South African information technology security company. While most organisations are now starting to realise the impact of data theft and abuse of IT resources by employees, J2 recognised the need to protect against this activity some time ago. J2 Software was born after the founders identified an opportunity in the information technology market in South Africa and the rest of Africa. They saw a growing need for information security solutions that were comprehensive, simple to deploy, easy to use and good value for money. After tireless searching and investigation J2 Software was officially launched in 2006.

Shortly after inception the customer list of J2 Software started to grow rapidly; and this continues to be the case to this day. J2 Software has provided services and solutions to numerous renowned, forward thinking companies with sites running in South Africa, Angola, Botswana, Kenya, Malawi, Mauritius, Mozambique, Tanzania, Uganda and Zambia.

J2 Software provides solutions and services to various organisations that have a requirement to secure their sensitive information as well as implement, monitor and enforce internal security policies. In recent times organisations are placing a far higher priority on the security, accountability and control of their most prized asset, their information.

Adding to this is the ever growing pressure being placed on companies and their directors to maintain the security and control of the sensitive data of their clients, as well as the necessity to conform to various local and international compliance regulations.

With the continued rise of identity theft and confidential data leakage the need for our product offering is not only and advantage, but an absolute necessity.

Editorial contacts

Ivor van Rensburg
IT Public Relations
(082) 652 8050
ivor@itpr.co.za
John Mc Loughlin
J2 Software
(011) 794 2537
john@jtwo.co.za