Data, not hardware, is a company's most valuable asset

March/April 2000 Information Security

During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.

Just another South African crime statistic, one may ask?

"No, almost certainly not," says Ian Melamed of Ian Melamed Secure Computing. "What made these burglaries significant was the fact that in each of the cases, the company computer file servers holding all the data files were stolen.

"Whenever we lose hardware, we automatically assume the person who is stealing it, is doing so for the hardware itself," Melamed says. "It is only when you start putting a series of thefts together, that it starts looking sinister."

Information theft

"The most probable motive behind these crimes is information theft", he says. "Information theft has already reared its head in several spectacular incidents in South Africa. Data stolen from a computer in Cape Town was used in a blackmail attempt against an AIDS sufferer," Melamed continues.

"The unfortunate victim had regular sums of money demanded from him in exchange for his employer not being informed of his condition. In other cases, the theft of information in respect of employee versus employer disputes has become a regular occurrence".

Although hardware theft is nothing new - either here or overseas - very often the theft of a workstation or smaller equipment goes unreported because the replacement value falls within the insurance excess of company.

"The theft of file servers is however, a different kettle of fish," Melamed says. "File servers and networks which are stolen usually exceed an insurance excess by thousands and thus they are reported. Too often the emphasis is placed on the value of the hardware being stolen and not upon the data that might be found - and used - on the system.

"The question arises, if lawyers' offices are being targeted, then who is next on the list? Accountants? Medical surgeries? The recent thefts seem to indicate the criminal activity of information theft which is already prevalent in foreign countries, has now spread its tentacles into South African society as well," says Melamed.

Information is a resource like money, labour and materials. Unfortunately, this is often realised only after the loss has occurred and the value of data is hard to assess because on the face of it, it is not perceived to be a tangible physical asset.

"It can be compared to buying a R2000 safe and then putting a R2 million necklace into it for safekeeping," Melamed says. "The loss of data, quite apart from the disruptive effect on normal operations, can cause severe embarrassment and provide opportunities for extortion. If equipment is stolen, it is the duty of the system owner to ensure that no clients are exposed to any sort of danger as a result."

Quite apart from the very real danger of sensitive information falling into the wrong hands, there is also a possibility that an aggrieved party might hold the theft victim responsible in a civil claim for any damages caused.

For two reasons then, data can be a company's Achilles Heel if it is not protected properly.

So how can a company protect itself and its clients?

"All companies holding potentially sensitive data should - for their own and their clients' sake - ensure that data is protected through either direct encryption; physical disk disablement; back-up systems; or anti-virus protection," says Melamed.

"Direct encryption means the use of an internal facility which encrypts individual documents as they are created," he says. "Physical disk disablement works much like a time delay lock on the safe at a bank. The disk can only be accessed during normal office hours and even if the disk is physically stolen, it will be useless without the access code.

"A suitable back-up system will ensure that encrypted data which is on a stolen disk, can be recovered, while anti-virus protection will ensure that the system not fall prey to digital burglary through unauthorised backdoor e-mailing of data," Melamed says.

For details contact Ian Melamed, MD of Ian Melamed Secure Computing on cell: 082 444 3661 or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.