Ten facts senior management likes to keep quiet

September 2009 Security Services & Risk Management

It is always safe to set middle managers the task of safeguarding company assets and secrets since it is only the lower-grade workers that steal. Or is it?

Business leaders and owners are under constant pressure to protect their companies’ assets from external and internal thieves, specifically low-grade workers who are renowned for helping themselves to things that do not belong to them. Sadly, this misconception often saves the company money lost to pilfered stationery, but costs much more when the real thieves strike.

“Middle and senior managers are often assumed to be honest and above suspicion when it comes to the risks of internal theft and fraud,” states Amir Lubashevsky, executive director of Magix Integration. “The opposite is actually true. The biggest threat to business comes from the higher management levels.”

Amir Lubashevsky, executive director, Magix Integration
Amir Lubashevsky, executive director, Magix Integration

Lubashevsky offers the following 10 facts all companies should know about their senior management.

1. Middle and senior management commit most cases of serious fraud because it is so much simpler for them to access the needed information and areas of the business.

2. Senior management can get their hands on sensitive information simply by asking for it. Who is going to refuse to give a senior member of staff the latest accounting data or a list of new customers?

3. Authority figures can simply ask for data without justifying their requests. Who will point out to them that they do not have permission to see or take the data away?

4. Senior managers are more familiar to the outside world and are therefore targets for social engineering swindles.

5. Senior management do not generally have enough technical knowledge to understand the risks they expose the organisation to when using PCs, laptops and mobile technology. Nor do they understand the danger of social engineering and blowing their own trumpets to strangers.

6. Senior managers are forced to trust other 'smart people' to give them the information they need to do their jobs. They generally have no idea of how to verify the accuracy of the information.

7. Due to workloads, managers tend to delegate sensitive work to people who do not understand its importance and can compromise security. Alternatively, they blindly delegate to those with a good understanding of it and are planning to exploit it for personal gain.

8. How many managers have loud, uncensored cellular conversations or access confidential information via laptop in public places, such as airports or restaurants? While they may feel very important, they are also leaking information to anyone in the vicinity.

9. Senior management feel they are too important to suffer restrictions they impose on other people. Their egos expose their organisation to severe security risks by not limiting their access to only what they need.

10. While we think lower ranks are the job hoppers today, senior management jump ship more often than any other level of employee. Moreover, they take large amounts of information with them, some of it very sensitive, with no control over how it is used.

Society tends to assume that managers are above the masses in terms of ethics and trustworthiness. The reality is management has access to valuable information and assets and is there for a target for criminal syndicates as well as its own greed. Failure to implement the appropriate risk mitigation measures to protect a company from senior staff members that give in to temptation will lead to losses, possibly even the loss of the business.

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
A winning combination for modern cybersecurity
Information Security Security Services & Risk Management
Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.

Read more...