End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa

End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa

Shandre Kim Jansen van Rensburg
Copyright: © 2021 |Pages: 16
DOI: 10.4018/JGIM.293290
Article PDF Download
Open access articles are freely available for download

Abstract

Information is a vital asset needed by many organizations to function effectively. However, this asset can easily be compromised thus its protection is crucial to the efficacy of an organization. A common information security breach used is social engineering. Social engineering is the use of manipulative and deceptive techniques against the inherent nature of human beings to access sensitive and confidential information to achieve an illicit action or omission of action. Through a qualitative inquiry, this article investigated the perceptions of employees concerning social engineering in the workplace to extract practical lessons from local businesses located in Gauteng Province, South Africa.The findings confirm that human beings should be at the forefront of defense against social engineering attacks and advocates for a multi-inter-trans-disciplinary social engineering protection model to practically assist organizations in developing a healthy and effective information security culture.
Article Preview
Top

Introduction

Many information security breaches, which transpire in the workplace, are largely the result of noncompliance (intentional or unintentional) to information security policies (Kessler et al., 2020; Safa & Maple, 2016; Verizon Enterprise, 2018). In fact, organizations cite negligent employees as their greatest vulnerability to risk exposure (Ernst & Young, 2019). An International Business Machines (IBM, 2020) security study on the cost of information security breaches revealed that the global average cost of a data breach is $3.86 million. The United States of America recorded the highest average total cost of data breaches at $8.64 million, followed by the Middle East at $6.52 million and Canada at $4.5 million. Conversely, Latin American and Brazil had the lowest average total cost at $1.68 million and $1.12 million, respectively. In South Africa, the average cost of a data breach is estimated to be $2.14 million and takes approximately 228 days to detect and contain (IBM, 2020). A global pandemic, brought about by COVID-19, has caused employers to allow their employees to work outside of the traditional office environment to increase social distancing defense mechanisms (World Health Organization, 2020; Blurke, 2020; Hunter, 2019; Kelly, 2020). This increase in remote working and use of own device for work purposes makes it significantly more difficult and costly to identify and contain a data breach (Baillette & Barlette, 2020; IBM, 2020). Global and local findings show increased budget allocations for automated, physical and technological security systems (Chan et al., 2014; Herath & Rao, 2009; Mouton et al., 2014a). However, information security breaches are on the increase and are largely undeterred (Verizon Enterprise, 2018), particularly concerning mistakes and misdemeanors made by end-user employees (Chan et al., 2014). Within the South African context, scientific and pragmatic research on information security and the multi-inter-trans-disciplinary (MIT) nature of social engineering in the workplace is under-developed. There is a dearth of awareness and implementation of user-friendly resources to sustain a healthy level of security and protection.

Social engineering is a psychological strategy used to manipulate and exploit end-users for personal gain. It is the use of devious and deceptive techniques against the inherent nature of human beings to access sensitive and confidential information in order to achieve an illicit action or omission of action (Jansen van Rensburg, 2017). The root causes of data breaches are categorized as malicious attacks, system glitches and human error (IBM, 2020). Social engineering attacks are the result of one or a combination of these categories. Information security breaches manifest in different ways that include the hacking of Twitter as well as the Zoom and Marriott data breaches (Dutta, 2020). The Marriott data breach involved the theft of half a million global hotel guests’ personal information through credential stuffing and phishing attacks – notorious social engineering techniques (Marriott International, 2020).

Complete Article List

Search this Journal:
Reset
Volume 32: 1 Issue (2024)
Volume 31: 9 Issues (2023)
Volume 30: 12 Issues (2022)
Volume 29: 6 Issues (2021)
Volume 28: 4 Issues (2020)
Volume 27: 4 Issues (2019)
Volume 26: 4 Issues (2018)
Volume 25: 4 Issues (2017)
Volume 24: 4 Issues (2016)
Volume 23: 4 Issues (2015)
Volume 22: 4 Issues (2014)
Volume 21: 4 Issues (2013)
Volume 20: 4 Issues (2012)
Volume 19: 4 Issues (2011)
Volume 18: 4 Issues (2010)
Volume 17: 4 Issues (2009)
Volume 16: 4 Issues (2008)
Volume 15: 4 Issues (2007)
Volume 14: 4 Issues (2006)
Volume 13: 4 Issues (2005)
Volume 12: 4 Issues (2004)
Volume 11: 4 Issues (2003)
Volume 10: 4 Issues (2002)
Volume 9: 4 Issues (2001)
Volume 8: 4 Issues (2000)
Volume 7: 4 Issues (1999)
Volume 6: 4 Issues (1998)
Volume 5: 4 Issues (1997)
Volume 4: 4 Issues (1996)
Volume 3: 4 Issues (1995)
Volume 2: 4 Issues (1994)
Volume 1: 4 Issues (1993)
View Complete Journal Contents Listing