Securing business systems goes beyond the technology

Issue 8 2021 Information Security

While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond technology. For all the best technology, a human lapse could result in a catastrophic breach.


Tim Wood.

Let’s use an analogy that many South Africans will be accustomed to. Security-conscious estates or complexes have varying levels of access control. These complexes have high walls, electric fences, security guards manning key entry points and many – if not all – have security monitoring and patrolling the premises 24/7.

It’s possible that this environment could lull someone into a false sense of security and they’d let their guard down. However, we know that this would be a mistake. Just because the complex or estate boasts these security measures, there are still several ways someone could be at risk.

When they enter and leave the complex, they could become targets of criminals. When they are inside their own unit, they may not be aware of an undetected breach at the estate’s entrance. It is possible criminals are operating from within the secured estate. What if they have adult children going in and out late at night?

Obviously, this is not an exhaustive list of possibilities, but the point is obvious – it would be a mistake to be lulled into taking anything for granted because we understand that security extends beyond the physical measures in place. And so, in the South African context, one invests in physical security and then continually remains aware of risks and behaves in a way to minimise them.

Similarly, securing a company requires a conscious effort and it involves an interplay of people, processes and technology. In a traditional workplace setup, a company can – and will – do all that it can to control its environment. As the pandemic has shown so vividly, this environment no longer exists only in a physical form, yet the requirement to secure it remains.

A company can no longer lock the doors and rely on the fact that access is restricted. Systems need to be accessed remotely and in providing for this you lose control of the environment. As sobering as it is, you must start with the premise that your staff will, at some point, leave their laptop unattended in a public space.

Securing company systems requires protecting your software, protecting your hardware, protecting and backing up your data and the ongoing education of your system’s users. To get this right, it is important to ask - and answer - who is accessing your systems, from where, using what, how and why they are accessing them?

Who is trying to access your systems?

In an ideal scenario, it is your employee attempting to access company systems. However, someone may have stolen login credentials, which would be a targeted and planned attack. Alternatively, it is also possible someone encountered an unlocked device and is opportunistically attempting to gain access. There are various ways to mitigate this risk. User access management is paramount. A company needs strong password policies such as complexity rules and password resetting timetables. Multi-factor authentication adds a layer that could be the difference between being breached or not.

One cannot always rely on an employee to remember to lock their devices every time they are not using them and so auto-lock is crucial. Encrypting external devices such as hard drives and USB sticks is vital – what if an employee leaves a USB stick on a coffee shop table or airport lounge chair?

Where is the employee working from?

Remote working means that an employee must access systems from various locations. In many instances, it will be their home, but they could also be accessing systems from an airport or café. As a priority, organisations should implement virtual private network (VPN) technology to ensure encrypted and private access to the corporate network.

As part of the ongoing education, employees should learn to become aware of their surroundings and the potential for eavesdropping. They should make the care and security of physical assets like laptops a priority. This extends to clean desk policies – nothing should be left lying around, while each employee should understand how to appropriately dispose of printed documents.

What devices are they using to access systems?

As far as reasonably possible, it would be wise to restrict access to company systems from devices other than company-managed assets. It is not ideal for staff to use personal or shared devices. With company-managed assets, a business can invest in central device management software, including the ability to wipe devices remotely. It enables companies to encrypt hard drives, ensure appropriate back-ups are in place and update devices with the latest operating systems and malware and antivirus software.

How is the employee accessing your systems?

While employees may access company systems through their dedicated home fibre, it is also possible they are connecting via public Wi-Fi access points. Again, it can never be overstated – education is paramount. Take the time to teach staff about the dangers of unsecured Wi-Fi and honeypots, as well as being aware and alert to their surroundings. Then reinforce this message consistently.

Why are they accessing the company system?

They may need to access emails and collaboration tools, but it may also be that they work in critical areas such as payments. There are various things a company can do here, including limiting access levels depending on the employee’s job function, monitoring the device activity of staff working in critical areas and running vulnerability scans and penetration tests, which are simulated cyber-attacks against your own system to isolate vulnerabilities that need to be addressed.

Securing a business’s systems is an ongoing task. It is about cultivating a company-wide security mindset as much as it is about investing in the best available technology. Very much like living in South Africa today.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Information Security
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.