Internal breaches on the rise
SECURITY| Oct. 12, 2010, 2:58 p.m.
There has been an unprecedented surge in the number of information security breaches coming from inside companies, says J2 Software.
J2 Software managing director John Mc Loughlin says events across the globe over the past 18 months have forever changed corporate consciousness in the security landscape. Companies must urgently address the situation to protect their information assets and the privacy of their electronic identity, he says.
Mc Loughlin says as the complexity of data and ease of access keeps increasing, now more than ever, companies have a golden opportunity to push information security to the top of their agenda.
“ It is more important than ever to ensure that information is protected and risk is minimised, especially considering the ever-changing business environment. Information drives businesses and has become the lifeblood of modern organisations, without it they die.”
According to a number of recent studies, the ‘ Insider Threat’ has loomed to become the most feared information security risk in most organisations today. Regardless of the technologies and software solutions that an organisation may deploy to mitigate the risk of information security breaches, the critical factor is always people.
He says the only solution is to build information security into the DNA of the organisation and its employees.
Building information security into the DNA of any organisation is the key to achieving compliance and mitigating risk, but it also presents the biggest challenge, especially for large and complex organizations, says Mc Loughlin.
There must be a balance between business risk, business operations and business competitiveness. This also requires the organisation to use tools which are proactive as opposed to reactive.
The importance of the IT Security Policy document and how it is communicated and enforced is a crucial issue. Most of these documents are too bulky and unmanageable, making them likely to remain unknown and unnoticed. Keeping it ‘ live’ and relevant, while communicating the relevance throughout the organisation is the key to achieving the objectives of the document. This proves to be a difficult task, especially when even the authors of the policies can sometimes forget what it contains.
He notes there are examples where risk has been communicated, but has been purposely ignored when it is financially advantageous to do so. In these cases, the audit department ‘ red flag’ certain suspicious activity to management but is somehow ignored. Reluctance to escalate a known irregularity is highly likely if the irregularity is generating large sums of money.
‘ Compliance Fatigue’ can result from the constant updating and revision of regulatory compliance requirements.
All of these factors must be taken into account when considering the implementation of a long term Governance, Risk and Compliance strategy.
Driving down the cost of compliance is not only the key to competitive advantage, but also to compliance being taken seriously and becoming part of a cost effective executive risk management strategy, he says.
“ If compliance is too time consuming and complex it will be ignored or short cuts will be taken.”
MORE SECURITY NEWS
RSA research reveals blind spots in threat detectionRSA, The Security Division of EMC, has released the results of a new Threat Detection Effectiveness Survey. Read More
Banking security in Africa reaching a tipping pointEntersekt CEO Schalk Nolte looks at the growing security risks for banks and financial institutions in Africa and explains why complacency is no longer an option. Read More
Nigeria loses N127bn to cyber thievesBetween 2013 and 2014, the activities of criminals who chose the cyber space as their platform of operation has cost Nigeria a whopping N127billion. Read More
Staying one step ahead of information security threatsThe need to continually adapt to an increasingly hostile environment has resulted in a significant change from the familiar security measures that kept us “comfortable” a mere five years ago. Read More
ESET warns of new Facebook threatESET has warned of malicious links being sent to Facebook users under the title: “My video”, “My first video”, or “Private video”. Read More
What you need to know about WhatsApp’s end-to-end encryptionUsers of the instant messaging service WhatsApp will now benefit from more secure conversations after the company announced it has turned on full end-to-end encryption. Read More
Arbor Networks’ on-premise DDoS solution wins gold for best security hardwareArbor Networks Inc., the security division of NETSCOUT (NASDAQ: NTCT), has announced that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Arbor Networks as the winner of four of its Global Excellence Awards. Read More
Students unveil fingerprint car starting moduleIt is often said that necessity is the mother of inventions and this may be deemed true with finger print motor starter, a new innovation from Uganda developed by software engineering students of Makerere University. Read More
Remember governance in the rush to next generation platformsEnterprises are actively looking to next generation application and analytics platforms, but they need to be aware that the platforms alone cannot assure quality data and effective data governance, warns KID. Read More
Forgot password? Behaviour metrics authentication in mobile devicesRSA, The Security Division of EMC, says the future is truly about choice and providing secure authentication that makes it easy for users to comply with security policies. Read More
FEATURED STORYCriticism over Remita borne out of ignorance, says SystemSpecs
The CEO of SystemSpecs, the company behind the revenue-saving Nigerian Single Treasury Account (TSA) system, speaks to Biztechafrica.
BEST READ NEWS
IN DEPTHIBM Opens First Cloud Data Centre in South Africa
IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.