Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
Creating A Culture Of Security
 
Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential information getting lost or falling into the wrong hands?

I say it’s because many enterprise managers view security as the method for protecting their information infrastructure, rather than focusing on the protection of the data itself.

Organisations, and their clients, are better served when management and staff establish a ‘culture of security,’ protecting valuable data and infrastructure resources.

An ever-growing growing percentage of computer crimes are being committed by professional ‘criminals’ who steal market-valued sensitive data - e.g. credit card data and customer identities. Sometimes the criminals are inside an enterprise; sometimes insiders and outsiders work together to steal and resell valuable company data, as we’ve seen recently in reports on call centre fraudsters in India and Scotland.

Corporate executives, for the most part, continue to be more ‘reactive’ than ‘proactive’ when it comes to securing critical corporate and customer data. When security breaches such as those of ChoicePoint, Bank of America and AOL make headlines, the mandate ‘keep us out of the press’ is handed down to security managers. The mandate frequently carries no additional budget to deliver the security that is required for the task at hand.

The cost of security breaches has, for years, been calculated based on the direct cost of remediation. However, classic models to determine the appropriate level of security spending were developed before companies had to publish press releases whenever they had a security breach. As industry regulations and laws become ever more explicit in terms of best-practice security procedures, so do potential liabilities. Plus we must factor in damage to company brands, declines in stock price, customer loss (and the legal and notification costs). This all means that adequate funding for data security measures become a recognised cost of doing business.

Even as more companies develop increasingly detailed security policies and hire compliance officers, security managers continue to report that the regulations and security policies are not translating into behavioural change. If anything, security managers report only sporadic enforcement of security policies and growing confusion related to the ownership of the data protection problem in some larger enterprises. In some organisations, there are many different departments and teams which own some part of the data security/privacy problem, with the result being difficulty in reaching decisions and deploying technology and process change.

It is time to acknowledge that security policies and technology alone, without ‘buy-in’ by staff, and enforcement by management, will not resolve the needs for regulatory compliance, and for the safety of customer, partner and employee information. Security tools will play their role in securing sensitive data from acquisition by the enterprise until its storage and deletion.

However, it remains the task of management to make real-world assessments of risks to data, how those risks are best mitigated and how these assessment decisions are promulgated and enforced throughout the enterprise. But ultimately, as I see it, the real challenge is in establishing a genuine ‘culture of security’ where staff and management view their data resources as central to the health and success of their organisation.

Mike Howse, Protegrity




BIOS, Jan 18, 07 | Print | Send | Comments (0) | Posted In Security
Related Articles

People Cannot Be Patched
Steganos Security Suite 2007
Panda Software Internet Security 2007
Malware Shift Creates New Challenges
Porn Affects Your Pupils!
Malware Writers Stick To Same Old Plot
Nuwar.B Worm Drives Up Stock Market Prices
'Happy New Year' Worm Spreading Rapidly
Fraudsters Cook Up Keylogging Surprises
Norton 360 Beta For Vista Now Available

More...
   
     
© 2006 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Statistics By OneStat - Sponsored By Ipswitch