Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Insiders pose biggest cyber security threats in organisations
    News

    Insiders pose biggest cyber security threats in organisations

    Kaluka wanjalaBy Kaluka wanjalaJuly 1, 20163 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    oracle logo 1508x706 c
    oracle logo 1508x706 c
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Database administrators and security professionals have been urged to take a proactive approach to data security by making encryption a priority if they wish to effectively protect the most vulnerable elements of their IT systems.

    The 2016 Data Breach Investigation Report by Verizon Enterprise indicates that databases are the second most frequently targeted asset by people inside an organisation, trailing only desktop computers.

    William Makatiani, the CEO Serianu, notes that over 75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employees. The situation is worsened by the fact that the content only has an approximate of 3,500 certified security personnel.

    Speaking at the Africa Security Summit in Tanzania, Janusz Naklicki, Oracle’s Senior Vice President for Africa says this proactive approach is fundamental to spotting and neutralising these threats before they have a significant impact on company data.

    Cyber security is one of the major challenges corporates are facing in the current business environment. Many of these concerns centre around the rise of hacking, a threat which has continued to outpace other means of attack by a large margin, and which has grown proportionally alongside today’s lucrative information black market.

    Every year, organizations pour billions of dollars into information security. And like clockwork, every year hackers find new ways to access and steal sensitive data. A nearly US$300 billion global cybercrime market is a powerful incentive for keeping ahead of the technology curve. Indeed, the market for stolen credit cards alone is north of US$100 billion, handily outstripping the entire global cocaine market. Africa is no exception.

    According to Mr. Nacklicki, building a database security strategy is the first step for a company in ensuring security has been addressed inside out.

    “It is surprising, then, that businesses don’t prioritise investment in protecting their databases. Even if an organisation’s perimeter is breached, by placing security controls around sensitive data, detecting and preventing SQL injection attacks, monitoring database activity, encrypting data at rest and in transit, redacting sensitive application data, and masking non-production databases, organisations can reduce the risk of data exfiltration,” he added.

    Point-of-sales intrusions have been identified as one of the largest contributors to data breach incidents. This is attributable to the fact that Point-of-sale devices continue to be a reliable source for this data, notably the POS terminals that directly consume magnetic stripe information from customers.

    It is essential to get check out the monitoring options available for the POS environment and validate the implementation.

    As a means to curb cybercrime, Oracle has delivered the industry’s most advanced technology to safeguard data at the source—the database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.

    The technology firm’s powerful preventive and detective security controls include database activity monitoring and blocking, privileged user and multi factor access control, data classification and discovery, transparent data encryption, consolidated auditing and reporting, secure configuration management, and data masking.

    Oracle
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    216 Capital and Plug and Play Launch Accelerator to Support Tunisian Tech Startups

    October 13, 2025

    Four Kenyan Innovators to Represent Kenya at Continental Women-in-Tech Hackathon

    October 13, 2025

    Comments are closed.

    Latest Posts

    Samsung Galaxy A36 5G: Full Specifications and Price in Kenya

    October 13, 2025

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    216 Capital and Plug and Play Launch Accelerator to Support Tunisian Tech Startups

    October 13, 2025

    Four Kenyan Innovators to Represent Kenya at Continental Women-in-Tech Hackathon

    October 13, 2025
    Advertisement
    Editor's Pick

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025

    What You Need to Know About Safaricom’s New VybCall Feature

    October 8, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.