Business A.M
No Result
View All Result
Sunday, February 22, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

Employing technical controls in information security systems

by Admin
January 21, 2026
in Analyst Insight

In last week’s article, I covered physical and environmental control. This week, as promised, I would cover some technical controls that companies can employ in their journey to gain a robust and secure information system.

Technical controls are security controls computer system executes to provide some levels of automated protection against unauthorised access or misuse of data. It facilitates detection of security violations, and more importantly, supports security requirements and provides some level of data protection.

Imagine you’re a chief information officer or a chief technology officer in Company Z, and you want one of your staffs to access a particular encrypted document. Still, you don’t want to go through the rigours of decrypting the file.

Or, you are a chief privacy officer, your data retention controls stipulate that unused data from a customer enquiry process, should be deleted after thirty days. What sort of technical tool would you employ to meet these policy requirements?

These scenarios call for specific technical controls.

In the first scenario, you would want to consider what is called homomorphic encryption, a sophisticated encryption technology which sets out to solve many security concerns. In the above case, the staff can carry out work without necessarily decrypting the data. Thanks to Craig Genery, the IBM researcher, who introduced the homomorphic encryption scheme to bring another viable and secure means to access encrypted data sets.

Another area where homomorphic encryption would work is in the healthcare industry where sensitive personal information flows around. As a healthcare provider, you can share encrypted information with a third-party supplier without them necessarily accessing information that you don’t want them to access. The third-party company can perform queries on your data with homomorphic encryption without gaining access to other data sets.

Data masking is another technical control that companies can use in securing data. Another name for data masking is data obfuscation. Data masking is a process used to hide data. Real data is obscured by random characters so that it can’t be accessed, which is another form to cover classified data points from company staffs that don’t have permission to view data. The main function of masking data is to protect sensitive information and more importantly, to implement role-based access control. If an admin staff in a health care company shouldn’t see certain information while carrying out her duties, then masking those particular data sets becomes fundamental. 

Next to masking is tokenisation. You’re about to send money to your colleague, but you need your token device to get some unique identifiers on a token. Without this, you can’t make that transfer. Well, companies can replicate these procedures in other business functions. For example, suppose your staff wants to transfer documents to another branch. In that case, tokenisation can assist in ensuring that information is only transferred with a unique identifier. The unique identifier retains all the pertinent information about the data without compromising its security. A tokenisation system links the original data to a token but does not provide any way to decipher the token and reveal the original data. Tokenisation is in contrast to encryption systems, which allow data to be deciphered using a secret key.

In the case where data should be deleted securely, company XYZ can use degaussing. Degaussing is the process of reducing or eliminating an unwanted magnetic field stored in computer hard drives or USBs. When exposed to the magnetic field of a degausser, the data on the hard disk is erased. This method is the guaranteed form to erase data from hard drives, and it’s an industry-standard form of data destruction. Data protection stipulates that companies should delete data securely and safely, and degaussing helps companies achieve this.

Paying attention to these technical controls can help companies ensure that they shore up their security procedures and ensure that they continue to maintain a robust information security system.

Admin
Admin
Previous Post

Big Tech’s Global Strategy in the Cloud

Next Post

Leading on the Road Less Traveled: My First 90 Days at Wharton

Next Post

Leading on the Road Less Traveled: My First 90 Days at Wharton

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
NGX taps tech advancements to drive N4.63tr capital growth in H1

Insurance-fuelled rally pushes NGX to record high

August 8, 2025

Reps summon Ameachi, others over railway contracts, $500m China loan

July 29, 2025

CBN to issue N1.5bn loan for youth led agric expansion in Plateau

July 29, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

Nigeria unveils N800bn industrial push to cut oil dependence

Nigeria unveils N800bn industrial push to cut oil dependence

February 20, 2026
CMAN calls oil revenue reform key to investor confidence recovery

CMAN calls oil revenue reform key to investor confidence recovery

February 19, 2026
Zoho targets Africa expansion after 30 years with self-funded growth strategy

Zoho targets Africa expansion after 30 years with self-funded growth strategy

February 19, 2026
GSMA presses telecoms to rethink business models for trillion-dollar B2B growth

GSMA urges rethink of spectrum policy to close rural digital divide

February 19, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
  • CBN to issue N1.5bn loan for youth led agric expansion in Plateau

    0 shares
    Share 0 Tweet 0
  • Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

Nigeria unveils N800bn industrial push to cut oil dependence

Nigeria unveils N800bn industrial push to cut oil dependence

February 20, 2026
CMAN calls oil revenue reform key to investor confidence recovery

CMAN calls oil revenue reform key to investor confidence recovery

February 19, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M