Operating in a security conscious market

February 2007 Information Security

The IT security market continues to be influenced by issues like social engineering, identity theft and compliance with legislation.

Corporate South Africa should associate IT security with more than just efforts to protect the business against external threats.

Traditionally, this segment of the market has been largely defined by policy creation and implementation. The main objective of formulating and integrating this policy has been to organise a united front to fend off threats such as viruses, worms, spam and Trojan horses.

At the same time, policy addresses specific practical, operations-focused procedures regarding the security of systems. It is inextricably linked to corporate governance and serves as a reference guide to monitor the role played by technology and people.

This is especially relevant given the need for businesses to comply with legislation.

Security service providers are called in to protect the parameter of the business and ensure that all employees fully grasp the intricacies of policy and procedure. The main priority has been to safeguard the integrity of data and decision makers are quite prepared to invest strategically in technology to meet this core business requirement.

But IT security is no longer limited to securing systems and implementing anti-virus.

Innovation in applications, an increase in volume and variety of digital devices and the surge in electronic communication and networks has impacted on the growth of the sector.

In many ways IT security now mirrors the ongoing focus on personal security and has evolved to incorporate far more than just hardware, software and unfolding information wars in cyber space.

Cyber criminals have been quick to develop their techniques and improve their modus operandi in order to capitalise off the convergence of digital devices with online technology.

As such, businesses and individuals need to seriously consider the risks associated with realtime communication. These risks find form in threats such as smishing and phishing, both of which rely on social engineering tactics to gain advantage over victims.

Smishing is the term used to describe an attempt by cyber criminals to illegally solicit personal information and/or spread digital threats by using SMS technology and connectivity to mobile devices.

It is disturbing to note the visible rise in digitally-based, socially-executed attacks.

There have been several reports of late of school children being physically assaulted whilst fellow pupils record the attack and review and swap footage on their mobile phones.

Online chat rooms and dating services, especially those accessed via cellphones, are often used by individuals to stalk their victims.

It is this need for vigilance and scrutiny when using communication technology that compels service providers, technology vendors and resellers to better understand the social side of IT security.

The implications of an apathetic approach to this growing problem are worrying given the growth of the mobile and wireless market.

Clint Carrick is the CEO of Carrick Holdings.

For more information contact Clint Carrick, Carrick Holdings, +27 (0)11 807 9560, [email protected], www.carrick.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...