With the current crisis of cyber-attacks and data breaches or leaks, we are faced with low rates of cyber security vigilance and high cybercrimes. Every enterprise is challenged to constantly back up their cyber security system to protect their database and information systems to avoid these data leaks and cyberattacks.
Menny Barzilay, Head of IT Audit of Bank Hapoalim described Cyber Security as “the sum of efforts invested in addressing cyber risk, much of which was, until recently, considered so improbable that it hardly required our attention,” in an article on ISACA’s Knowledge Centre. When we further define cyber risks, which is the loss or harm of information due to a cyberattack or data breach, we then see the need of efficiently protected information systems.
Data or Personal information is an extremely valuable commodity because when in the wrong hands, it is used for financial benefits by cyber criminals who participate or gain information from data breaches. The cyber criminals take the data and sell it and in return make a lot of money out of the whole data breach.
In a radio interview Mr Sizwe Snail ka Mtuze, Director of Snail Attorneys and Lex-Informatica, said “Your ID number is so Important because it identifies you, your birth date, your race, your citizenship and whole lot of other things which could be used for an unlawful purpose”, when asked why information like a person’s ID number is so important to these cyber criminals.
Anyone or any organisation with confidential information in their possession is a target. How would an organisation know whether they are ready? Whether they have the enough information security? the reality is that these cyber criminals are getting smarter and more advanced in the techniques they use.
According to an article on Fin24.com, “Without a fully functional Information Regulator, these breaches will continue to occur without sanctions provided for in the Protection of Personal Information Act (POPIA)”, said Advocate Pansy Tlakula, Chairperson of the Information Regulator of South Africa . Which is why organisations and individuals need to be in the business of effectively educating themselves on cyber security vigilance, cybercrime trends, data breaches and cyber law.
What are we doing as organisations to protect ourselves? What measures are we taking? What legal implications are there regarding such incidents? The assumption that cyber vigilance is the primary function of only IT, Legal, Compliance, Risk or Information Management in organisations is where the loophole in our information security is found.
Lex-Informatica SA Cyber Law and ICT workshop is focused on equipping people with necessary skills and education to guard against threats in their workplaces, homes and IoT devices.
Date: 13th and 14th September 2018
Venue: Durban Country Club
Theme: “The advancements of Information and Communication Technology Law – Cyber Law: Techniques, Risks, Legal implications and Emerging trends”
Book your seat to be enlightened on the reality, cost and possible threats of cyberattacks to your business, personal data and other interconnected devices.