AIRLINK 198.20 Increased By ▲ 0.23 (0.12%)
BOP 10.00 Decreased By ▼ -0.04 (-0.4%)
CNERGY 7.31 Increased By ▲ 0.02 (0.27%)
FCCL 36.70 Increased By ▲ 0.70 (1.94%)
FFL 17.00 Increased By ▲ 0.09 (0.53%)
FLYNG 25.58 Increased By ▲ 0.54 (2.16%)
HUBC 134.72 Increased By ▲ 0.69 (0.51%)
HUMNL 14.11 Decreased By ▼ -0.03 (-0.21%)
KEL 4.78 No Change ▼ 0.00 (0%)
KOSM 6.90 Decreased By ▼ -0.04 (-0.58%)
MLCF 45.43 Increased By ▲ 0.45 (1%)
OGDC 218.20 Decreased By ▼ -0.03 (-0.01%)
PACE 6.96 Increased By ▲ 0.02 (0.29%)
PAEL 41.20 Decreased By ▼ -0.22 (-0.53%)
PIAHCLA 16.86 No Change ▼ 0.00 (0%)
PIBTL 8.49 Increased By ▲ 0.03 (0.35%)
POWER 9.50 Increased By ▲ 0.11 (1.17%)
PPL 184.90 Decreased By ▼ -1.03 (-0.55%)
PRL 41.09 Decreased By ▼ -0.18 (-0.44%)
PTC 25.08 Increased By ▲ 0.31 (1.25%)
SEARL 104.19 Decreased By ▼ -0.46 (-0.44%)
SILK 1.03 Increased By ▲ 0.02 (1.98%)
SSGC 40.50 Decreased By ▼ -0.41 (-1%)
SYM 17.90 Decreased By ▼ -0.15 (-0.83%)
TELE 8.88 Decreased By ▼ -0.03 (-0.34%)
TPLP 12.81 Decreased By ▼ -0.03 (-0.23%)
TRG 67.24 Increased By ▲ 0.64 (0.96%)
WAVESAPP 11.55 Increased By ▲ 0.25 (2.21%)
WTL 1.78 No Change ▼ 0.00 (0%)
YOUW 4.00 No Change ▼ 0.00 (0%)
BR100 12,091 Decreased By -18.8 (-0.16%)
BR30 36,578 Decreased By -19.7 (-0.05%)
KSE100 115,173 Increased By 131.1 (0.11%)
KSE30 36,233 Increased By 33.2 (0.09%)

ISLAMABAD: The National Information Technology Board (NITB) has identified increase in incidents involving unauthorised access associated with the handling, storage, and transfer of sensitive digital documents and confidential files and the compromise of sensitive digital documents and confidential files can result in severe consequences.

The board issued an advisory “Securing Sensitive Digital Documents and Confidential Files” and noted that NTISB has been issuing advisories related to information security from time to time to safeguard confidential information from unauthorised access.

Due to the increasing frequency of unauthorised access incidents affecting a variety of organizations in Pakistan, including government agencies, private institutions, and public service sectors, the NTISB has identified increase in incidents involving unauthorised access associated with the handling, storage, and transfer of sensitive digital documents and confidential files.

The unauthorised exposure of sensitive information, whether through malicious intent or accidental mishandling, can severely compromise organisational integrity, data confidentiality, and the national security.

Aim of the advisory is to reiterate and provide guidelines for the secure management of sensitive files in digital formats, including scanned documents, soft copies, and internal records, to minimise the risk of unauthorised access and potential breaches.

The compromise of sensitive digital documents and confidential files can result in severe consequences, including unauthorised access to internal records, exposure of confidential data, breach of organisational and governmental trust, and potential threats to national security.

Addressing vulnerabilities in information handling and access control is therefore essential to mitigating these risks and maintaining data integrity.

The advisory noted that entities handling sensitive documents in digital form, particularly those using networked systems, cloud storage, or external storage devices for file management, are at increased risk of unauthorised access. This includes government agencies, public institutions, private organisations, educational institutions, and SMEs that store or transmit sensitive information.

The NTISB recommended measures to secure digital files and prevent unauthorized access to confidential records including: a. Implement Strong Access Controls. Use role-based access control (RBAC) to limit access to sensitive files strictly to authorised personnel. Assign permissions based on job roles, ensuring that only those with a legitimate need have access to confidential information.

Enforce Multi-Factor Authentication (MFA) for Sensitive Files Access.

Require multi-factor authentication (MFA) for accessing files containing sensitive information, especially for administrative and privileged accounts. Implement authentication mechanisms such as hardware tokens, mobile-based verification, or biometric authentication to add an additional layer of security as deemed appropriate. c. Encrypt Sensitive Digital Files.

Utilize robust encryption algorithms for storing sensitive files, both on local servers and cloud-based storage. Encryption ensures that even if files are accessed by unauthorized users, the content remains protected. d. Use Secure File Transfer Protocols.

When transferring sensitive files digitally, use secure file transfer protocols, such as SFTP or HTTPS, to protect data in transit from being intercepted or tampered with. e. Implement Document Watermarking. Apply digital watermarks to sensitive files to identify document owners and trace unauthorized distribution.

Watermarking provides an added layer of traceability and deterrence against unauthorized sharing of documents. f. Audit Access Logs Regularly. Enable logging for all access to sensitive files, with regular audits to monitor unusual or unauthorized access attempts.

Maintain audit trails for an adequate retention period to support any necessary investigations. g. Educate Employees on Information Handling Best Practices. Conduct training sessions and awareness programmes for employees to reinforce best practices for handling sensitive information.

Employees should be aware of potential risks and understand secure data management procedures. h. Implement Data Loss Prevention (DLP) Systems. Deploy Data Loss Prevention (DLP) systems to monitor and control the sharing of sensitive information within and outside the organization. DLP systems can detect and prevent unauthorized sharing or movement of confidential files.

Control External Device Access. Limit or restrict the use of external storage devices (e.g., USB drives) for storing or transferring sensitive information. Implement policies for device encryption and track device usage to prevent data exfiltration via physical media. j. Conduct Regular Vulnerability Assessments and Penetration Testing.

Perform periodic vulnerability assessments and penetration testing on systems managing sensitive documents. These tests can help identify and address potential security gaps that could lead to unauthorized access. k. Create and Enforce a Strong Password Policy.

Mandate complex passwords for systems accessing sensitive files, with policies that include minimum length requirements, a combination of alphanumeric and special characters, and regular password updates.

Copyright Business Recorder, 2025

Comments

200 characters