All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "722673",
"signature": "Article:722673",
"url": "https://staging.dailymaverick.co.za/article/2020-09-22-employees-working-from-home-how-to-guard-against-cyberattacks/",
"shorturl": "https://staging.dailymaverick.co.za/article/722673",
"slug": "employees-working-from-home-how-to-guard-against-cyberattacks",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Employees working from home? How to guard against cyberattacks",
"firstPublished": "2020-09-22 00:12:53",
"lastUpdate": "2020-09-22 00:12:53",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6091,
"contents": "As the coronavirus forces more people globally to work from home, we are becoming increasingly reliant on technology to live, work and play. However, many organisations are ill-equipped to deal with employees working remotely and the cybersecurity risks that come with it.\r\n\r\nWith the commencement of South Africa’s Protection of Personal Information Act, 2013 (POPIA) on 1 July 2020, it has never been more important to ensure the security of organisational data. How can companies protect themselves from this scourge? One way is by implementing the global standards set out in ISO Standards 27001, 27005 and 27032.\r\n\r\n<strong>Unintentional and intentional human actions</strong>\r\n\r\nIn response to the ever-changing and complex nature of work and systems, organisations have a wide array of systems, controls, processes and procedures to safeguard client data and company intellectual property, such as firewalls, regular password changes and multi-factor authentication. However, these safeguards can be rendered ineffective if employees compromise them by, for example, accessing websites that are infected with viruses.\r\n\r\nOccasionally, and perhaps due to economic pressures experienced by staff (especially during the pandemic), employees may also find themselves on the other side of the law by intentionally colluding with cybercriminals to manipulate company systems and client data with the promise of financial reward.\r\n\r\n<strong>Outdated legal frameworks</strong>\r\n\r\nLife Healthcare, Honda, the World Health Organisation, Nedbank, Amazon and Microsoft have all experienced incidents of cyberattacks this year. However, the law is not necessarily well-equipped to deal with this problem. For example, South Africa’s current legislation dealing with cybercrime, primarily the Electronic Communications and Transactions Act, 2002, has not kept up with the dynamic and constantly evolving nature of technology and associated cybercrime. In addition, the new Cybercrimes Bill, which will codify numerous existing offences related to cybercrime and will create a variety of new offences, has still not been passed by Parliament.\r\n\r\nFurther complicating matters is that the effective investigation and prosecution of these types of crimes is complex, requiring specialist skills, and raises challenging issues of cross-jurisdictional cooperation between law enforcement agencies. As such, implementing measures to prevent a cyberattack from happening in the first place should be a top priority for companies.\r\n\r\n<strong>ISO guidelines</strong>\r\n\r\nThe International Organisation for Standardisation (ISO) has issued a number of standards that provide information security risk management and cybersecurity guidelines for organisations. The focus of these standards is to address internet security issues and to provide technical guidance in addressing common internet security risks.\r\n\r\n<strong>Risk assessment</strong>\r\n\r\nISO 27032 recommends that an organisation conducts a risk assessment to identify relevant risks. In conducting this risk assessment, some of the issues that should be considered are:\r\n<ul>\r\n \t<li><strong>Identifying critical assets</strong>: it is not cost-effective to protect all assets equally. It is therefore essential that critical assets are identified so that particular care may be taken to protect them. The designation should be made from a business context by considering what the impact on the business would be if the asset was lost or degraded.</li>\r\n \t<li><strong>Identifying relevant risks</strong>: current risks faced in a business context, as well as additional and evolving risks, threats and attacks that may become relevant when participating in cyberspace, should be considered.</li>\r\n \t<li><strong>System or service retirement</strong>: systems or services that are no longer required should be retired and all security-related information should be invalidated to ensure that interfacing or related systems are not compromised.</li>\r\n \t<li><strong>Consistency</strong>: the approach to risk management should apply across the entire cyberspace.<strong> </strong></li>\r\n</ul>\r\n<strong>Cybersecurity controls</strong>\r\n\r\nA few of the cybersecurity controls recommended by ISO 27032 include:\r\n<ul>\r\n \t<li><strong>Server protection controls</strong> are used to protect servers against unauthorised access and the hosting of malicious content. These controls include server configuration to ensure appropriate access controls on programs and system directories, enabling audit trails on systems and regularly conducting audit trails. Implementing and running appropriate anti-virus and anti-spyware software on servers is also recommended.</li>\r\n \t<li><strong>End-user controls</strong> include using the latest supported software applications with the most updated security patches to ensure that programs are secure and any known vulnerabilities have been addressed. Anti-virus and anti-spyware tools should be installed and appropriate safeguards implemented. Further controls include using phishing filters and enabling personal firewalls and host-based intrusion detection systems.</li>\r\n \t<li>Introduce <strong>policies</strong> that govern information security risk management, basic policies governing the creation, collection, storage and transmission of data, as well as corporate policy statements and penalties relating to the misuse of cyberspace applications.</li>\r\n \t<li>Organisations should include <strong>awareness and training</strong> as part of their cybersecurity so that they regularly and continually raise their employees’ awareness of cybersecurity threats and how to identify and deal with these threats.</li>\r\n</ul>\r\n<strong>POPIA</strong>\r\n\r\nHaving a robust and organisation-specific cybersecurity plan is vital considering that South Africa has enacted POPIA, which commenced on 1 July 2020. POPIA obliges organisations to report data breaches and it is therefore essential that an organisation takes steps to manage the risk of a cyberattack materialising and to mitigate against any consequent harm.\r\n\r\nCyberattacks can have a crippling effect on organisations. Not only can they cause significant damage to reputation, impact on business continuity and result in the loss of sensitive and confidential information, but damages may also have to be paid to individuals whose data has been breached. <strong>DM</strong>\r\n\r\n<a href=\"https://www.ensafrica.com/people/detail/1385/\"><em>Suad Jacobs</em></a><em> is forensics executive with ENSAfrica.</em>",
"teaser": "Employees working from home? How to guard against cyberattacks",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "61993",
"name": "Suad Jacobs",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/suad-jacobs/",
"editorialName": "suad-jacobs",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "12438",
"name": "Cyberattacks",
"url": "https://staging.dailymaverick.co.za/keyword/cyberattacks/",
"slug": "cyberattacks",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberattacks",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "193224",
"name": "Popia",
"url": "https://staging.dailymaverick.co.za/keyword/popia/",
"slug": "popia",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Popia",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "17971",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/0Udf5EVffjjo1_nmOtSuyUe9kyM=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ZSKoQnTvyCV_m1MhExey3vlHD2E=/450x0/smart/file/dailymaverick/wp-content/uploads/groundupCyber.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/GsTsoXJM86En66fM81xYOnjBVqs=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/TyaceUmwSYHulYgW5_rJ7wTl6SI=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/SxmRrTwusnYXtHXkCqiu1c_UmSk=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/0Udf5EVffjjo1_nmOtSuyUe9kyM=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/ZSKoQnTvyCV_m1MhExey3vlHD2E=/450x0/smart/file/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/GsTsoXJM86En66fM81xYOnjBVqs=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/TyaceUmwSYHulYgW5_rJ7wTl6SI=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/SxmRrTwusnYXtHXkCqiu1c_UmSk=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/groundupCyber.jpg",
"type": "image"
}
],
"summary": "Implementing measures to prevent a cyberattack from happening in the first place should be a top priority for companies.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Employees working from home? How to guard against cyberattacks",
"search_description": "As the coronavirus forces more people globally to work from home, we are becoming increasingly reliant on technology to live, work and play. However, many organisations are ill-equipped to deal with e",
"social_title": "Employees working from home? How to guard against cyberattacks",
"social_description": "As the coronavirus forces more people globally to work from home, we are becoming increasingly reliant on technology to live, work and play. However, many organisations are ill-equipped to deal with e",
"social_image": ""
},
"cached": true,
"access_allowed": true
}