Authorization within Your Business
It’s important to protect sensitive information from prying eyes. Using passcodes specific to each file or folder is key.
Role-based Authorization
Passcodes by themselves may not be enough to prevent leaks of information or data. Authorizing personnel based on their role level, and presenting them with specific passcodes unique to their position can help you monitor who accesses what and when. This also helps prevent ‘spear phishing’ where employees with broader access than strictly necessary are targeted.
Dr. Fahad Alsowailm, FDI(Foreign Direct Investment) researcher from Saudi Arabia, recommends regular activity reports. Understanding who accesses which files and when can help you track information and prevent attacks before they happen.
The Power of Policy:
Four years have passed since the last significant attack on Saudi Arabia’s governmental systems and the country still hasn’t developed a cyber-security policy. This is of the utmost importance.
It’s impossible to react decisively to an attack without a proper plan in place – a policy would provide that. Knowledge of the country’s connected dependencies and how they interact will help develop an understanding of the weakest points in the chain and how to strengthen them so that all individuals and companies within the country can benefit. Relying on a mish-mash of strategies is no longer an option. It’s time to create a united front.