Hopefully, the chief justice’s office employed the services of an IT person competent in protecting the files. They should have been backed up, since recreating these from scratch would be a very expensive and time-consuming exercise. Secondly, all files containing sensitive information should have been encrypted and protected so as to be of no use to the robbers. The 15 computers were almost certainly on an internal network linked to a server and via that to the internet. The IT person in charge of the network would have had a link to cloud storage, which means all the information on the computers would have been stored on the cloud. The thieves would have got a lot of nearly data-empty computers, and if the IT person was on the ball, the minute the robbery was known they would have changed cloud passwords. Ultimately, all the Department of Justice would have to do when it receives new computers is re-link to the cloud to retrieve all its information. An understanding of the extent...

Subscribe now to unlock this article.

Support BusinessLIVE’s award-winning journalism for R129 per month (digital access only).

There’s never been a more important time to support independent journalism in SA. Our subscription packages now offer an ad-free experience for readers.

Cancel anytime.

Would you like to comment on this article?
Sign up (it's quick and free) or sign in now.

Speech Bubbles

Please read our Comment Policy before commenting.