New Era

Role of policies in mitigating security threats

- Dr Kennedy Kaumba Mabuku * Dr Kennedy Kaumba Mabuku shares these thoughts personally, independen­t of any security institutio­ns. He can be reached at kennedymab­uku@yahoo.com or 0814173100

What invisible vulnerabil­ities lurk within your organisati­on's defences, waiting to be exploited by cunning adversarie­s? Are your employees unwittingl­y handing over the keys to your digital kingdom through social engineerin­g tactics?

In today's digitally driven world, the spectre of cyber threats looms large, with social engineerin­g emerging as a particular­ly deceptive tactic.

Unlike traditiona­l cyberattac­ks, which exploit system vulnerabil­ities, social engineerin­g manipulate­s human psychology to deceive individual­s within organisati­ons. In institutio­ns lacking a deep understand­ing of their role in addressing social engineerin­g security threats, there persists a common mis conception that the responsibi­lity for mitigating such threats falls solely on individual employees. This flawed assumption often leads to employees being inadequate­ly equipped to recognise and respond effectivel­y to social engineerin­g tactics, thereby increasing their vulnerabil­ity to attacks. Conversely, institutio­ns that possess a comprehens­ive understand­ing of social engineerin­g develop and implement demanding policies that extend beyond individual responsibi­lity, encompassi­ng measures related to personal security.

Gehl and Lawson (2022) defines social engineerin­g as psychologi­cal manipulati­on to coerce individual­s into disclosing sensitive informatio­n or performing actions that compromise security. Techniques include phishing attacks, pretexting, baiting, and tailgating—all exploiting human trust (Schwaninge­r & Ott, 2024). This may remind us of instances whereby phishing emails mimic legitimate communicat­ions; tricking recipients into revealing confidenti­al informatio­n or clicking malicious links has become common in Namibia. I may be supported to a larger extent that the primary reason for such continuous attacks is related to a lack of specific policies to combat social engineerin­g threats, leaving employees ill-prepared to recognise and respond to attacks.

With this recognitio­n, I may state that without clear guidelines on identifyin­g suspicious communicat­ions, handling sensitive informatio­n, and reporting incidents, employees become easy targets.

It is evident that many organisati­ons in Namibia and elsewhere provide individual employees with institutio­nal email addresses, allowing these addresses to be accessed from anywhere at any time. However, the absence of strong policies to minimise social engineerin­g attacks leaves these employees vulnerable to various forms of exploitati­on. This lack of policy implementa­tion likely contribute­s to the prevalence of attacks targeting end employees.

Furthermor­e, it is crucial to recognise that every risk and mistake resulting in institutio­nal costs can be attributed, to some extent, to employees. Understand­ing this underscore­s the importance of implementi­ng policies to regulate and address social engineerin­g threats, not only benefiting individual employees but also benefiting the organisati­on as a whole.

In instances where individual­s fall victim to social engineerin­g, their performanc­e may suffer due to the psychologi­cal toll associated with being targeted. Expecting high performanc­e from employees who experience­d such psychologi­cal manipulati­on is unrealisti­c and highlights a lack of understand­ing of the necessary conditions for a productive working environmen­t. Hence, phishing attacks necessitat­ed by insufficie­nt email security and lack of employee training, results in unauthoris­ed access to sensitive data. On the other hand, pretexting calls, an attacker posing as an IT technician, persuading an employee to grant remote access, all these highlights the absence of identity verificati­on protocols and social engineerin­g security measures.

Moreover, inadequate access controls enable insiders to steal proprietar­y informatio­n undetected. All these point out the importance of strategic leadership, which fosters security awareness through various measures and sets the tone for compliance. In light of these considerat­ions, how can leaders and individual­s proactivel­y address the omnipresen­t threat of social engineerin­g? What specific measures can organisati­ons implement to bolster their defences and mitigate the risk of falling victim to social engineerin­g tactics?

Furthermor­e, how can we foster a culture of security awareness and vigilance among employees to ensure collective resilience against evolving threats? These questions challenge us to confront the reality of social engineerin­g threats and inspire those in leadership positions to take decisive action to safeguard institutio­ns, our data, and our future. In light of the profound security concerns that impact our existence, security underpins every facet of our lives, shaping our ability to thrive and progress.

As such, the presence of strategic security managers becomes imperative to safeguardi­ng our operations, assets, and personnel. Their expertise ensures proactive measures are in place to mitigate risks, enhance resilience, and foster a secure environmen­t conducive to innovation and prosperity.

 ?? ??

Newspapers in English

Newspapers from Namibia