Data Protection: National Sovereignty (By Babacar Charles Ndoye)

During the month of October 2022, the Telecommunications and Postal Regulatory Authority was the victim of a data breach involving 149 GB of data.The amount of data hacked is not the most important thing, but rather the nature of the data stolen, and the image that such an act sends to an agency as important as ARTP.

Only the nature of the stolen data can determine the risk impact of this incident.

This incident is a recurring phenomenon in the digital world and no system is immune, as there is no security guarantee that offers 100% fusion database protection. In this context, we are facing a clear data breach, as it involves unauthorized disclosure of data, and unauthorized access to this data.

Other hacking techniques can also be used to block the entire system and make it completely unavailable. Different types of vulnerabilities can appear during an attack, among others.

At the infrastructure level:

• Lack of a central database where data is classified and stored.
• Failure to implement access rights and their control on database servers.
• Using a cloud outside our control: Check security measures, validate terms and conditions, risk of the supplier disappearing, theft, format changes.
• Not respecting the change of hardware standards every 3-5 years,

The list is far from exhaustive.

What about the security requirements for personal data and sensitive data in Senegal?

We must, in truth, recognize that Information Systems Security. Management is an integral part of business. Must be an autonomous a desire to avoid routine and not a mission in an. IT infrastructure management department. From what exists, we must move towards consolidation with an independent and autonomous. National Agency for Information Systems Security with human resources skills and practical and field experience.

Its mission will be to ensure the governance of the security strategy of the state’s information systems, of the departments and entities under supervision, of the security of assets and people and to lend support to the private sector.

To keep up with the digital age, a consistent reform policy is essential.

Investing in employee preparedness is the sg number way to protect organizations. The human factor plays a key role in ensuring cyber resilience. As Barbara Engels said, cybersecurity is crucial to the success of digital transformation. The full potential of digital technologies can only if institutions. Businesses, and individuals can rely on the security of their data and systems.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top