Information as your primary asset and today's security challenges — Lionesses of Africa
  • Home
  • Blog
  • Community
  • Knowledge
  • Cover Stories
  • Startup Stories
  • Playbooks
  • Podcasts
  • Português
    • Events Homepage & Booking
    • Start-Up Night Africa Series
    • Lioness Lean In Series
    • Lionesses of Africa Annual Conference
    • Harvard University / Lionesses of Africa Conference
    • Young Lioness Lean In Series
    • About Us
    • Impact Partners
    • Contributor Team
    • Contact
    • Join the Community
    • Signup for FREE Newsletters
    • Share Your Startup Story
    • Share Your Lioness Launch
    • Share Your Lioness Co-Lab
    • Become a Contributor
    • Nominate to '100 Lionessess'
    • Become an Impact Partner
    • Contact LoA
Menu

Lionesses of Africa

276 5th Avenue
New York, NY, 10001
(212) 634-4540
The Pride of Africa's Women Entrepreneurs

the pride of Africa's women entrepreneurs

Lionesses of Africa

  • Home
  • Blog
  • Community
  • Knowledge
  • Cover Stories
  • Startup Stories
  • Playbooks
  • Podcasts
  • Português
  • Events +
    • Events Homepage & Booking
    • Start-Up Night Africa Series
    • Lioness Lean In Series
    • Lionesses of Africa Annual Conference
    • Harvard University / Lionesses of Africa Conference
    • Young Lioness Lean In Series
  • About +
    • About Us
    • Impact Partners
    • Contributor Team
    • Contact
  • Connect +
    • Join the Community
    • Signup for FREE Newsletters
    • Share Your Startup Story
    • Share Your Lioness Launch
    • Share Your Lioness Co-Lab
    • Become a Contributor
    • Nominate to '100 Lionessess'
    • Become an Impact Partner
    • Contact LoA

Information as your primary asset and today's security challenges

July 11, 2020 Melanie Hawken
pablo-223.png

by Ntsoaki Sibiya (née Kortjass), founder & ceo, Tsoabelo Security Solutions

Today's businesses are confronted with an ever-changing set of tasks when it comes to securing the assets of an organisation. While the safekeeping of traditional physical assets is familiar ground for many, the new wired economy has thrust upon us a whole new realm of security challenges.

Although technology has simplified many activities within an organisation, and the 4th industrial revolution has opened up new worlds of opportunity, these advancements have also put an organisations most valuable assets and information at an increased risk.

Risk assessment

The first step in securing an organisation is to conduct a risk assessment. This is the process of identifying all of the assets that may have value, or that may damage the organisation's ability to operate should they be stolen or corrupted. In a risk assessment, physical assets are fairly easy to define because they are visible, tangible and appear on your balance sheets as capital equipment, inventories or negotiable instruments. 

There are the obvious information assets such as product drawings, plans, schematics and customer lists. However, some critical information assets may be difficult to identify. One way to get started is to ask everyone what information they need to receive in order to perform their jobs. Once you have identified the information assets, identify their source, including where the information is stored and through what method it is delivered for use. Next, identify the impact on the enterprise should that information be stolen or corrupted. This exercise will help one to quantify the value of specific information assets and help establish a priority for their protection. The final part of a risk assessment will be to identify who - both inside and outside the organisation - poses a potential threat to the information.

The next step in securing your organisation is to develop a written security policy based on the organisation's assets and the risk assessment. Quite simply, it's a document that describes what is acceptable use of the organisation's assets, and how an individual gains access to them. It is advisable that the policy has a section that covers how to treat information regardless of format, and procedures for protecting the information. It is also a good idea to define in writing the potential consequences of policy violation. Once one has identified the assets, conducted a risk assessment, and developed a written security policy, the next step is to create a security plan.

Security plan

The security plan identifies specific steps that the organisation will undertake to protect its assets, how it will respond to the various types of threats identified in the risk assessment, and how it will create security awareness and educate staff on acceptable use and protection of assets. The importance of such training cannot be overemphasised.

A variety of tools are commercially available for protecting one's assets such as:

* Electronic access control - This is the fundamental building block and backbone of all asset protection. Available from a wide variety of manufacturers, electronic access control systems allows one to control who can access specific physical areas and facilities. These systems can provide an audit trail indicating who went where, and when. Use the risk assessment to determine which areas need to be under the control of an electronic access control system. Depending on the manufacturer, the system may offer integration with some, or all, of the other tools mentioned in this article. 

* Visitor management - While most companies have visitors sign a register, and many issue them a 'Visitor' badge, this information is often kept in unusable formats (books stored somewhere), and can be virtually useless in attempting to conduct an investigation after an incident. Software-based visitor management systems are crucial. Many offer integration into electronic access control systems and provide a database record of an organisation's visitors.

* Intrusion detection - Most access control systems offer physical intrusion detection capabilities as an integral part of their design. Some traditional intrusion detection systems can be integrated into a separate access control system for greater user flexibility and coverage. Again, using risk assessment, wherever one has assets, there should be intrusion detection.

* Asset tracking - Today, asset tracking systems are available that utilise radio-frequency identification technology (RFID), infrared (IR), bar code or multiple technologies.  Asset movements can often be controlled with the same granularity that an electronic access control system provides for the movements of people, and an audit trail showing the asset's movement is often available as well. Sophisticated systems allow management to link assets to people, or groups of people, so that only authorised individuals may move an asset around a facility or remove it from a facility without triggering an alarm.

* Video surveillance - Video surveillance not only provides one with evidence to investigate an incident, it can also be a strong deterrent to inappropriate action. One of the benefits that digital systems provide is the ability to integrate with some electronic access control systems.

* Authentication - Authentication, especially in the information world, is often defined by something one has (a card, token, key, etc), and something one knows (such as a password). Elaborate - and the most secure - authentication incorporates a third element: a physical, or biometric, trait such as a fingerprint, a voiceprint, hand geometry, iris print, etc. 

* Firewall - A firewall is typically a computer network's first line of defence and is essentially a filter or access control system for a network that allows data to enter user-definable portions of the network from specific addresses and/or specific users. Attempts to breach the firewall are typically displayed in simple text-based messages on a central management console.

* Anti-virus systems - Of all the threats information may be exposed to, the one that is most common is some form of computer virus. Anti-virus (AV) systems typically scan incoming e-mail to each client (user) for known viruses, then either sanitise the content so it is safe to open or warn the user that a virus may be present. AV systems are simple to install and use, and should be required for every computer that accesses a network.

* Encryption - Data encryption software allows users to literally encrypt their files, emails, and other data, so that unauthorised individuals cannot use it if it is stolen or intercepted. Today's encryption software focuses not only on preventing unauthorised usage, but also on making it easy for users to encrypt their data. Encryption tools are vital for any type of portable information asset such as a notebook computer.

* Virtual Private Network (VPN) - A VPN is essentially a private network on public network infrastructure. If anyone accesses a network via the Internet or a dial-up connection, one should consider using a VPN. VPNs encrypt the data that is transmitted between the two parties so that if it is intercepted, it is useless. A VPN is vital for security if anyone in an organisation is going to be sending or receiving sensitive information from a remote location. 

* Public-Key Infrastructure (PKI) - PKI addresses the management and issuance of digital certificates. A digital certificate is a type of authentication which an individual keeps with him/her - typically on a token or smartcard - one piece of a mathematical key ('private key'). When the private key matches the public key, authentication (identity) is established, and one can be reasonably certain that the data being transmitted is coming from the authorised individual or site. 

* Paper shredder - This is the lowest-tech solution on the list but one of the most important. Searching through an organisation's or an individual's garbage is one of the oldest and most effective ways of gathering information.

All of the systems mentioned are available as standalone products. Some combinations of these tools may be available in an integrated system from a single vendor. Some vendors even offer solutions that allow different systems from different manufacturers to be integrated together. It's important to understand the difference between loosely integrated and seamlessly integrated systems.

Integration

A loosely integrated, or interfaced, system will often provide the user with multiple points of command, control, and monitoring over the various subsystems attached. A seamlessly integrated system provides a single GUI for all the individual sub-systems, and also stores all of the transactional data in a single database. 

Furthermore, the software architecture is such that updates to all or any specific functions are easily accomplished, without worrying about negatively impacting the unaffected portions of the system. One of the core functional and operational advantages that seamless integration provides is realtime linking of events within the various subsystems. 

Probably the most significant advantage a seamlessly integrated system offers is in data forensics. For example, if there is a theft of a notebook, instead of all that data being stored in different databases and having to be correlated manually, there would be a single view of all the data associated with the theft of that notebook computer. Furthermore, with the aid of seamlessly integrated digital video, video clips specific to the alarms could be stored in the database, and would eliminate any guesswork about the relevance of the video evidence.

Conclusion

Where does the future lie? It is not about physical asset security. It is not about information security. It is about security, period. Information is as valuable as gold, and potentially a lot easier to steal.

Technology is evolving to encompass both information and electronic/physical security into single, seamlessly integrated, open architecture based solutions that support component pieces from different vendors, allowing the end-user to choose best-in-breed solutions. Technology, as well as the growing recognition by management that all assets need comprehensive and cohesive protection, will spawn the creation of the new security professional, who will have dominion over all aspects of security within an organisation.

Have a safe and secured day!


Ntsoaki-lo-res.jpg

Ntsoaki Sibiya is the Founder and CEO of Tsoabelo Security Solutions, a 100% black woman owned company that specialises in security & risk management services (guarding operations , installations of access control systems and cctv surveillance). The company was established in 2017 and is based in Pretoria, South Africa. Having worked in the security industry for almost a decade, she quickly found her passion for the protection and risk management industry. She embarked on extensive research into the industry’s process, context and content, which gave her insights into the workings of a security business, and the ability to form the blueprint for her own security company. Ntsoaki is a firm believer that a greater role for women in the security is necessary not only to rectify a social injustice, but more importantly, because there is an economic and business imperative to use the talents of women to solve the problems that the world faces. She refers to herself as “the portrait of a power woman” – who is purpose driven and passionate about creating empowering environments, and uses her knowledge and expertise to articulate the importance of security and risk management in all environments. www.tsoabelosolutions.co.za

More articles by Ntsoaki.

Featured
The science of influence: How great mentors transform lives
May 1, 2025
The science of influence: How great mentors transform lives
May 1, 2025
May 1, 2025
Creating a legacy through mentorship and leadership
Apr 12, 2025
Creating a legacy through mentorship and leadership
Apr 12, 2025
Apr 12, 2025
The immense value of mentorship: A personal journey of growth and discovery
Jan 31, 2025
The immense value of mentorship: A personal journey of growth and discovery
Jan 31, 2025
Jan 31, 2025
Why mentorship should be part of your 2025 growth plan
Jan 8, 2025
Why mentorship should be part of your 2025 growth plan
Jan 8, 2025
Jan 8, 2025
Mentorship as a Key Strategy for Entrepreneurial Development
Sep 7, 2024
Mentorship as a Key Strategy for Entrepreneurial Development
Sep 7, 2024
Sep 7, 2024
Sharpening Your Axe as An Entrepreneur
Jun 23, 2024
Sharpening Your Axe as An Entrepreneur
Jun 23, 2024
Jun 23, 2024
Success as an Entrepreneur Lies Within Mastering Yourself
Sep 30, 2023
Success as an Entrepreneur Lies Within Mastering Yourself
Sep 30, 2023
Sep 30, 2023
The 3 Fundamental types of people who will shift your growth and the trajectory of your life
May 20, 2023
The 3 Fundamental types of people who will shift your growth and the trajectory of your life
May 20, 2023
May 20, 2023
Advancing Previously Disadvantaged Women In Private Security
Oct 17, 2021
Advancing Previously Disadvantaged Women In Private Security
Oct 17, 2021
Oct 17, 2021
COVID-19 Impact on the Guarding Industry
Mar 12, 2021
COVID-19 Impact on the Guarding Industry
Mar 12, 2021
Mar 12, 2021
In Guest Blog Tags Ntsoaki Sibiya, Security Management
Share
← Nozipho Mvulane and Arisha Rajaram, two legal entrepreneurs helping clients to find support in their times of needHow to end an unhealthy business relationship →

CELEBRATING 10 YEARS


LATEST PODCAST

LIONESSES OF AFRICA · AI Series - Navigating Artificial Intelligence In The Workplace

Lioness Radio Show Special Episode: Navigating AI in the Workplace - Tune in for an engaging conversation designed to equip you with the knowledge to embrace AI and unlock its possibilities for your business.


LIONESS WEEKENDER COVER STORIES

LIONESS WEEKENDER COVER STORY
Teboho Seretlo, a passion-driven entrepreneur helping SMEs to grow
Teboho Seretlo, a passion-driven entrepreneur helping SMEs to grow
Zanele Njapha, a transformational business leadership coach
Zanele Njapha, a transformational business leadership coach
Mekdes Mesfin, a proudly Ethiopian fashion designer and manufacturer
Mekdes Mesfin, a proudly Ethiopian fashion designer and manufacturer
Emilia Chisango, a multi-faceted business empire builder
Emilia Chisango, a multi-faceted business empire builder
Morongwe Mokone, a passionate champion of artisanal homeware
Morongwe Mokone, a passionate champion of artisanal homeware

IMAGE OF THE DAY. CELEBRATING WOMAN MADE IN AFRICA.

Image of the Day / Adèle Dejak

Big bold accessories…We are big fans of luxury jewellery and accessories made with love and passion on the African continent, and Adèle Dejak in Kenya is the epitome of handmade luxury. The brand c
Image of the Day / ReelFruit
 
Healthy snack treats…We love showcasing Africa’s women agribusiness builders, and ReelFruit, founded by Affiong Williams, is inspirational - it’s the largest fruit processing, packaging and distributi
Image of the Day / Dokmai Rwanda

Made in Rwanda Handbag…A passion for handcrafted accessories, combined with a sense of pride for ‘Made in Rwanda’ products, inspired Dokmai Rwanda founder, Bernadette Umunyana, to create a company
Image of the Day / Eki Silk

Silk Serenity…Nothing is quite as luxurious as silk, that’s why we love the ‘Africa on Silk’ collections from Eki, founded by Hazel Eki Osunde. Her latest Deep Dive Collection is inspired by the p
Image of the Day / The Nanjala Company

Pot plants delivered… Give gifts that will last, such as these stunning plants in individual pots from The Nanjala Company in Kenya, founded by Teresa Nanjala Lubano. This online store creates customized
Image of the Day / Sari for Change

Sustainable Sari Glamour - If you want to wear a robe that makes you feel and look glamorous, then Rayana Edwards, founder of Harem in South Africa, has a range of fabulous robes all made from sari fabrics. She has
Image of the Day / MonChoco

Pure chocolate heaven…If you are a chocolate lover, then you need to experience raw chocolate at its finest, and Dana Mroueh, founder of MonChoco an artisan chocolatier in Côte d’Ivoire, has just what y
Image of the Day / Mulandi Brindes

Say it with flowers…If you want to make someone feel special, then there is no better way than with the gift of fresh flowers, and Mulandi Brindes in Mozambique, founded by Vanessa Guilherme Nhabete, creates
Image of the Day / Mariée Eventos

The Wedding Planner…Every big celebration day needs great organization, and that’s where Iris Lezi Munguambe, founder of Mariée Eventos in Mozambique, is your go-to person. She launched he
Image of the Day / Dounia Home

Statement lighting… from Dounia Home, the home of innovative, handcrafted and ethically made Moroccan lighting and home decor founded by Dounia Tamri-Loeper. Her company designs, produces and brings to market hi
Image of the Day / Adèle Dejak

Big bold accessories…We are big fans of luxury jewellery and accessories made with love and passion on the African continent, and Adèle Dejak in Kenya is the epitome of handmade luxury. The brand c Image of the Day / ReelFruit
 
Healthy snack treats…We love showcasing Africa’s women agribusiness builders, and ReelFruit, founded by Affiong Williams, is inspirational - it’s the largest fruit processing, packaging and distributi Image of the Day / Dokmai Rwanda

Made in Rwanda Handbag…A passion for handcrafted accessories, combined with a sense of pride for ‘Made in Rwanda’ products, inspired Dokmai Rwanda founder, Bernadette Umunyana, to create a company Image of the Day / Eki Silk

Silk Serenity…Nothing is quite as luxurious as silk, that’s why we love the ‘Africa on Silk’ collections from Eki, founded by Hazel Eki Osunde. Her latest Deep Dive Collection is inspired by the p Image of the Day / The Nanjala Company

Pot plants delivered… Give gifts that will last, such as these stunning plants in individual pots from The Nanjala Company in Kenya, founded by Teresa Nanjala Lubano. This online store creates customized Image of the Day / Sari for Change

Sustainable Sari Glamour - If you want to wear a robe that makes you feel and look glamorous, then Rayana Edwards, founder of Harem in South Africa, has a range of fabulous robes all made from sari fabrics. She has Image of the Day / MonChoco

Pure chocolate heaven…If you are a chocolate lover, then you need to experience raw chocolate at its finest, and Dana Mroueh, founder of MonChoco an artisan chocolatier in Côte d’Ivoire, has just what y Image of the Day / Mulandi Brindes

Say it with flowers…If you want to make someone feel special, then there is no better way than with the gift of fresh flowers, and Mulandi Brindes in Mozambique, founded by Vanessa Guilherme Nhabete, creates Image of the Day / Mariée Eventos

The Wedding Planner…Every big celebration day needs great organization, and that’s where Iris Lezi Munguambe, founder of Mariée Eventos in Mozambique, is your go-to person. She launched he Image of the Day / Dounia Home

Statement lighting… from Dounia Home, the home of innovative, handcrafted and ethically made Moroccan lighting and home decor founded by Dounia Tamri-Loeper. Her company designs, produces and brings to market hi

STARTUP STORIES. MEET THE WOMEN WHO’VE LAUNCHED.

Featured
Jacqueléne Coetzer, a pan-African business consulting and specialist trade firm builder empowering other women entrepreneurs
Jacqueléne Coetzer, a pan-African business consulting and specialist trade firm builder empowering other women entrepreneurs
Schneidine Phidelmond, an entrepreneur building a holistic digital agency supporting WSMEs and SMEs in Mozambique
Schneidine Phidelmond, an entrepreneur building a holistic digital agency supporting WSMEs and SMEs in Mozambique
Suné Theisinger and Dr Juanri Jonck, two dynamic players in the aesthetic industry in South Africa
Suné Theisinger and Dr Juanri Jonck, two dynamic players in the aesthetic industry in South Africa
Tania Kabeya, a passionate chef and entrepreneur building a uniquely African culinary brand
Tania Kabeya, a passionate chef and entrepreneur building a uniquely African culinary brand
Aasiyah Adams, a visionary South African tech founder helping individuals and organisations to thrive in the digital economy
Aasiyah Adams, a visionary South African tech founder helping individuals and organisations to thrive in the digital economy

LIONESS DATA & INSIGHTS


LIONESS PLAYBOOKS



Screen Shot 2020-01-27 at 6.01.32 PM.png
Screen Shot 2020-01-27 at 5.34.58 PM.png

Sign up today to receive the #1-rated newsletters for Africa's women entrepreneurs.

* indicates required
Required: Please select your newsletter(s):


LIONESS BOOK REVIEWS

Featured
Authentic Selling: Be Real to Seal the Deal by Kendrick Shope
Authentic Selling: Be Real to Seal the Deal by Kendrick Shope
Babette’s Bread by Babette Kourelos
Babette’s Bread by Babette Kourelos
SOS – A Navigation Guide for Women at Work by Lidewij Wiersma, Chantal Korteweg, Tessel van Willigen and Marijn Wiersma
SOS – A Navigation Guide for Women at Work by Lidewij Wiersma, Chantal Korteweg, Tessel van Willigen and Marijn Wiersma
Unstoppable Entrepreneurs: 7 Paths for Unleashing Successful Startups and Creating Value through Innovation by Lori Rosenkopf
Unstoppable Entrepreneurs: 7 Paths for Unleashing Successful Startups and Creating Value through Innovation by Lori Rosenkopf
Afro-Optimism Unleashed by Adeolu Adewumi-Zer
Afro-Optimism Unleashed by Adeolu Adewumi-Zer

About Us  |  Contact Us  | PRIVACY POLICY | terms OF SERVICE  | Community Guidelines  

© 2025 LIONESSES OF AFRICA public benefit corporation. ALL RIGHTS RESERVED.