POPIA Compliance
September 9, 2021
Vaccinations v Human Rights and Business
September 27, 2021

CISO acknowledged that they have a major challenge in knowing who have access to the data. This problem elevated when Covid19 struck and many companies had to make hasty plans to the landscape of remote workers.  Many companies have opted for cloud solutions and many VPN’s was built to at least try and protect the infrastructures of the company from the home to the office or the cloud. This problem has not disappeared as yet and there is an increase in vulnerabilities and threats that includes malware and data breaches.

One of the reasons is that 50%+ of individuals as access to company data that has no relevance to their job. It is becoming harder for IT security staff to establish who has access to what information and whether they do need access to that specific information. Furthermore, due to loadshedding, slow internet and frustrations getting information on time to assist clients or completing the task at hand, it is found that staff members download sensitive data to the endpoint devices for faster access. This is the reason why it becomes harder to secure the data. Think, how do you secure something that you do not know it is there? Cybercriminals are well aware of this fact and it is not difficult for them to target remote users to get access to the corporate network. Furthermore, if we consider the changes in connectivity and how quickly it interchanges accessing the cloud, it can create major damage to companies as they are totally blind to where the data resides, who has access to the data and not to talk about the many ways to connect to the internet or cloud.

You may ask, then how do I minimise these risks and still have a business tomorrow.


The short answer is to increase the capacity to secure data by starting with your data.
1) Detect where your data resides in your infrastructure
2) Distinguish between sensitive data and other data.
3) Do data classification for easy tracking.
4) Establish who has access to sensitive data and why?
5) Revoke any access if not a necessity to a user-profile
6) Secure the servers and endpoints with security solutions that also monitors these devices.

The process:

Leave a Reply

Your email address will not be published. Required fields are marked *