Icon

Directory

IconAccounting & Tax
IconActuaries
IconAdministrators
IconAppraisers & Valuers
IconArbitration Services
IconASIB
IconAssessors & Loss Adjusters
IconAssist and Lifestyle Benefits
IconAssociations & Institutes
IconAuditors
IconBBBEE Consulting and Verification Agencies
IconBroker Acquisition Financing
IconBrokers for Brokers
IconBusiness Process Management
IconCall Centre Outsourcing
IconCompany Secretarial Services
IconCompliance
IconConsumer Protection
IconCorporate Governance
IconCredit Bureaus
IconDebit Order Collection Facilities
IconDefensive Driver Training
IconEducation and Training
IconEmergency Medical Rescue
IconFAIS
IconFire, Storm, Flood Damage Specialists
IconHuman Resources
IconIndustrial Cleaners
IconInformation Technology and Software Partners
IconInsurance Companies
IconLegal
IconLightning Damage & Surge Protection Specialists
IconNiche Insurance Products
IconOmbud
IconOutsourcing Companies
IconPremium Financing
IconPublic Loss Adjustors
IconPublications
IconRating Agencies
IconReference Books & Material
IconRegulatory Authorities
IconRisk Finance
IconRisk Management
IconRisk Surveyors
IconSalvage Operators
IconSpecialized Claims Investigations & Assessing
IconSurveys and Research
IconTraining Courses & Workshops
IconUnderwriting Managers
IconVehicle Accident Management
IconVehicle and Household Risk Inspection Services
IconVehicle Tracking
IconWellness Programs
IconWholesale Brokers
IconZZZZZZ
Image
  Subscribe To »

Linkedin hacking a warning for South African businesses

Published

2012

Thu

14

Jun

 

The recent hacking of social networking website, LinkedIn, has put personal information of millions of users at risk as more than six million passwords were stolen. According to Robert Boccia, Executive: IT at Lion of Africa Insurance, this is the latest breach in a string of high-profile hacks affecting consumers, companies and governments around the world, highlighting the significant risks of cyber-crime for South African businesses.

 

“From a financial perspective, cybercrime cost South Africa over R4 million last year with more than 4 646 online adults becoming a victim of cybercrime every day in the last year, and incurring an additional R7.1 million loss in time spent resolving the crime. Local businesses simply cannot afford these kinds of interruptions in 2012 and must take the necessary precautions,” says Boccia.

 

He warns that one of the most vulnerable areas for a company is their internal data security procedures. Boccia says the majority of data contamination and loss of intellectual property occurs as a result of security breaches within an organisation. For this reason, he urges South African businesses to tighten up internal data storage security, as well as to protect data from external breaches, in order to maintain their competitive advantage.

 

“It is not only hacking that companies need to look out for. Hacking involves sophisticated and invasive coding where the challenge is usually simply to gain entry into a closed system. The greater danger is internal security breaches such as password sharing and the circulation of unprotected emails within a company which allow criminals access to confidential information.”

 

He advises companies to carefully screen their employees who handle confidential company information. “At a low level, this can be done by means of a simple credit check. It is also vital that employees are trained as to how to use internal systems, so that they can be held accountable for the security of the data.”

 

Boccia says that it is important to firstly, extend perimeter protection beyond just the firewall and to ensure that a comprehensive security threat assessment is included as part of your security strategy. Secondly, he stresses the importance of having internal management systems that incorporate updating antivirus and anti-malware automatically so that users do not need to worry about whether or not their systems are always up to date.

 

Furthermore, he says that it is imperative to commission regular penetration and vulnerability tests which assess the effectiveness of the security measures and can detect the possibility of an internal or external breach of security.

 

“The nature of business today means that companies are storing huge amounts of data on central servers. This data is used by company executives, CEO’s and junior employees alike and most of this information may be construed as confidential and sensitive. The challenge is to implement processes and procedures that allow the appropriate people access to the system but ensure the security of the data at the same time,” concludes Boccia.

 
Source: Epic Communications (Pty) Ltd
 
« Back to previous page Print this page » |
 

Breaking News »

Directors and Reckless Conduct: Disregarding Standards of Care

Article by Terrance M. Booysen, CEO, CGF Research Institute (Pty) Ltd Johannesburg: There has hardly been a day that goes by where the media headlines grip the attention of citizens, announcing yet another case ...
Read More »

  

Camargue Launches New Commercial Crime Module on eLearning Platform

Just two months since Camargue captivated the insurance industry with the launch of its Directors’ and Officers’ liability eLearning platform - it has announced the addition of a Commercial Crime Liability ...
Read More »

  

Cyber-risk loss: what should board members do?

By Christine Rodrigues, Director Norton Rose Fulbright South Africa Cyber-risk has become the most significant concern for today’s boards. How does a company protect itself and how does a board deal ...
Read More »

  

ooba welcomes SA Reserve Bank decision to leave interest rate unchanged

The South African Reserve bank, under new governor Lesetja Kganyago, today announced that despite a pressurised economic outlook, interest rates will remain unchanged for this quarter, which means that the prime ...
Read More »

 

More News »

Image

Healthcare »

Image

Investment »

Image

Life »

Image

Retirement »

Image

Quick Survey »

  Sponsored by
Image
Can there be fair discrimination in the workplace?



|Results »
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image

From The Glossary »

Icon

Proposal:

A request for insurance submitted to the insurer by or on behalf of the insured. The proposal usually includes sufficient facts for the insurer to determine whether or not it wishes to accept the risk.
More Definitions »

 
 
By using this website you agree to the Terms of Use.
Copyright © Stoker Risk & ICT (Pty) Ltd 2004 - 2014.
All Rights Reserved.
Icon

Advertise

  Icon

eZine

  Icon

Contact IG

Icon

Media Pack

  Icon

RSS Feeds