Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Insiders pose biggest cyber security threats in organisations
    News

    Insiders pose biggest cyber security threats in organisations

    Kaluka wanjalaBy Kaluka wanjalaJuly 1, 20163 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    oracle logo 1508x706 c
    oracle logo 1508x706 c
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Database administrators and security professionals have been urged to take a proactive approach to data security by making encryption a priority if they wish to effectively protect the most vulnerable elements of their IT systems.

    The 2016 Data Breach Investigation Report by Verizon Enterprise indicates that databases are the second most frequently targeted asset by people inside an organisation, trailing only desktop computers.

    William Makatiani, the CEO Serianu, notes that over 75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employees. The situation is worsened by the fact that the content only has an approximate of 3,500 certified security personnel.

    Speaking at the Africa Security Summit in Tanzania, Janusz Naklicki, Oracle’s Senior Vice President for Africa says this proactive approach is fundamental to spotting and neutralising these threats before they have a significant impact on company data.

    Cyber security is one of the major challenges corporates are facing in the current business environment. Many of these concerns centre around the rise of hacking, a threat which has continued to outpace other means of attack by a large margin, and which has grown proportionally alongside today’s lucrative information black market.

    Every year, organizations pour billions of dollars into information security. And like clockwork, every year hackers find new ways to access and steal sensitive data. A nearly US$300 billion global cybercrime market is a powerful incentive for keeping ahead of the technology curve. Indeed, the market for stolen credit cards alone is north of US$100 billion, handily outstripping the entire global cocaine market. Africa is no exception.

    According to Mr. Nacklicki, building a database security strategy is the first step for a company in ensuring security has been addressed inside out.

    “It is surprising, then, that businesses don’t prioritise investment in protecting their databases. Even if an organisation’s perimeter is breached, by placing security controls around sensitive data, detecting and preventing SQL injection attacks, monitoring database activity, encrypting data at rest and in transit, redacting sensitive application data, and masking non-production databases, organisations can reduce the risk of data exfiltration,” he added.

    Point-of-sales intrusions have been identified as one of the largest contributors to data breach incidents. This is attributable to the fact that Point-of-sale devices continue to be a reliable source for this data, notably the POS terminals that directly consume magnetic stripe information from customers.

    It is essential to get check out the monitoring options available for the POS environment and validate the implementation.

    As a means to curb cybercrime, Oracle has delivered the industry’s most advanced technology to safeguard data at the source—the database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.

    The technology firm’s powerful preventive and detective security controls include database activity monitoring and blocking, privileged user and multi factor access control, data classification and discovery, transparent data encryption, consolidated auditing and reporting, secure configuration management, and data masking.

    Oracle
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Zenith Bank Enters Kenya With Paramount Bank Acquisition

    January 23, 2026

    Flutterwave Launches Stablecoin Balances for Merchants Across Africa in Partnership With Turnkey and Nuvion

    January 22, 2026

    Paymentology Appoints Kesheni Moodley as Regional Director for Africa

    January 22, 2026

    Comments are closed.

    Latest Posts

    LG OLED TVs: Cinematic true-to-life viewing experiences for live AFCON matches

    January 27, 2026

    How to Choose the Right Data Centre in East Africa: A Practical Guide for Enterprises and Startups

    January 27, 2026

    OPPO Launches Reno15 Series in Kenya With 200MP Camera

    January 26, 2026

    The Rise of Online Betting in Kenya: Why Players Are Choosing – Secretbet

    January 26, 2026
    Advertisement
    Editor's Pick

    How to Choose the Right Data Centre in East Africa: A Practical Guide for Enterprises and Startups

    January 27, 2026

    How 2026 will stitch together the future of payments

    January 22, 2026

    5 Blockchain Trends to Watch in 2026: Insights from D24 Fintech’s CTO

    January 21, 2026

    Why SMEs Need Tailored Digital Banking Solutions

    January 20, 2026
    © 2026 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.