Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Insiders pose biggest cyber security threats in organisations
    News

    Insiders pose biggest cyber security threats in organisations

    Kaluka wanjalaBy Kaluka wanjalaJuly 1, 20163 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    oracle logo 1508x706 c
    oracle logo 1508x706 c
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Database administrators and security professionals have been urged to take a proactive approach to data security by making encryption a priority if they wish to effectively protect the most vulnerable elements of their IT systems.

    The 2016 Data Breach Investigation Report by Verizon Enterprise indicates that databases are the second most frequently targeted asset by people inside an organisation, trailing only desktop computers.

    William Makatiani, the CEO Serianu, notes that over 75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employees. The situation is worsened by the fact that the content only has an approximate of 3,500 certified security personnel.

    Speaking at the Africa Security Summit in Tanzania, Janusz Naklicki, Oracle’s Senior Vice President for Africa says this proactive approach is fundamental to spotting and neutralising these threats before they have a significant impact on company data.

    Cyber security is one of the major challenges corporates are facing in the current business environment. Many of these concerns centre around the rise of hacking, a threat which has continued to outpace other means of attack by a large margin, and which has grown proportionally alongside today’s lucrative information black market.

    Every year, organizations pour billions of dollars into information security. And like clockwork, every year hackers find new ways to access and steal sensitive data. A nearly US$300 billion global cybercrime market is a powerful incentive for keeping ahead of the technology curve. Indeed, the market for stolen credit cards alone is north of US$100 billion, handily outstripping the entire global cocaine market. Africa is no exception.

    According to Mr. Nacklicki, building a database security strategy is the first step for a company in ensuring security has been addressed inside out.

    “It is surprising, then, that businesses don’t prioritise investment in protecting their databases. Even if an organisation’s perimeter is breached, by placing security controls around sensitive data, detecting and preventing SQL injection attacks, monitoring database activity, encrypting data at rest and in transit, redacting sensitive application data, and masking non-production databases, organisations can reduce the risk of data exfiltration,” he added.

    Point-of-sales intrusions have been identified as one of the largest contributors to data breach incidents. This is attributable to the fact that Point-of-sale devices continue to be a reliable source for this data, notably the POS terminals that directly consume magnetic stripe information from customers.

    It is essential to get check out the monitoring options available for the POS environment and validate the implementation.

    As a means to curb cybercrime, Oracle has delivered the industry’s most advanced technology to safeguard data at the source—the database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.

    The technology firm’s powerful preventive and detective security controls include database activity monitoring and blocking, privileged user and multi factor access control, data classification and discovery, transparent data encryption, consolidated auditing and reporting, secure configuration management, and data masking.

    Oracle
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Neeraj Pradhan appointed as CEO of Liquid Intelligent Technologies Kenya

    December 12, 2025

    Airtel Money Partners With I&M Bank To Expand Digital Payments Reach Across Kenya

    December 11, 2025

    Fincra Named Headline Supporter for Africa Tech Summit Nairobi 2026

    December 11, 2025

    Comments are closed.

    Latest Posts

    Neeraj Pradhan appointed as CEO of Liquid Intelligent Technologies Kenya

    December 12, 2025

    Inside Ampersand the Startup Powering East Africa’s Electric Motorcycles

    December 11, 2025

    Visa Showcases 22 Startups at Africa Fintech Accelerator Demo Day in Cape Town

    December 11, 2025

    Airtel Money Partners With I&M Bank To Expand Digital Payments Reach Across Kenya

    December 11, 2025
    Advertisement
    Editor's Pick

    Inside Ampersand the Startup Powering East Africa’s Electric Motorcycles

    December 11, 2025

    What You Need to Know About KCB and Visa’s New Tap to Phone Payment Solution in Kenya

    December 11, 2025

    Accelerated entry: How East Africa Leapfrogged into the Cloud Age

    December 11, 2025

    How Buying Data on M-PESA Opened New Doors for Sheila

    December 10, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.