You have either to put a great deal of faith into these individuals or hire a second set of employees who are only there to monitor every employee’s actions. You can imagine that this is no way to spend the company’s earnings. And who’s to say that you can trust the second set of employees in the first place…?
The realisation that your employees could open a backdoor for cyber criminals to find their way into your systems may be shocking (sorry about that) but it is worth pointing out in order for you to find ways to minimise this risk. This is where the implementation of a security framework comes into play but it can be a complicated and ongoing process. South African companies will have to implement IT security whether they want to or not, and we will discuss this in more detail in the future. In the meantime, there are a few steps you can take right away to ensure better IT security.
Use Legitimate Software
Restrict Administration Powers
Educate Your Workforce
- James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology