Change language
Change country

Business Guide: How to handle information security

Securing a business‘ information management is one of the most important duties in a company.
man working on tablet

With the pace of digital transformation accelerating, companies must act now to secure their information management systems. But too many organisations have delayed investing in a detailed security system, leaving them vulnerable to attack. Everyone’s business is now automated, digitised and online, bringing advantages of speed and cost, but introducing a host of potential vulnerabilities. Fortunately, establishing an efficient information security management system (ISMS) will go a long way to mitigating the dangers.

Cyber dangers

The main issue in the age of digital transformation is data protection, especially against cyber criminals. Tele-communications giant Verizon conducted research into the greatest security dangers facing companies, and concluded that it was from hacking, which contributes 40% of data breaches, and malware, which causes another 30%. One spectacular example was last summer’s massive cyber attack on shipping container giant Maersk in the port of Los Angeles. With computers and servers shut down, workers were forced to improvise using Twitter, Whats-App and Post-It notes. The Petya ransomware attack cost Maersk US$300 million and disrupted operations for two weeks, demonstrating that even global companies are vulnerable to attack.

“As villains create new threats, new tools are needed.“

hands typing on a keyboard

Technology is a world that never stands still and, unfortunately, that applies to the criminals too. That means that businesses can never rest on their laurels when it comes to ensuring that they have all of the latest tools and systems to keep their data secure at all times, regardless of what is thrown their way.

 

A well-designed information security management system (ISMS) will increase a company’s resilience to cyber attacks. But it’s not just a question of plugging in security technologies, then going to sleep. Creating the right ISMS requires a lot of thought before selecting a policy framework and relevant technologies. Companies need to do a risk assessment that identifies key vulnerabilities and then assess their business position to determine what their budget is. They will have to decide whether existing personnel have the technical capabilities, or whether they need to recruit, then set short- and long-term goals. Security risks change rapidly and ISMS systems have to evolve to deal with new threats. Businesses should seek guidance for their risk analysis from the multiple standards available, including COBIT, International Organization for Standardization (ISO) 27000 series and US National Institute of Standards and Technology (NIST) 800 series.

Identify the business' weakest point

An ISMS framework will take account of the fact that most cybersecurity incidents are caused by the lack of awareness of the victims, who fall prey to the cybercriminal traps. A high-profile example was the massive security breach last year at credit reporting agency Equifax, which leaked the data of more than 147 million consumers. The company’s CEO attributed the lapse to human error. It’s clear that technology is needed to reduce the risk of human error as much as possible, even if it can almost never be completely eliminated. Cybersecurity training programmes are essential to explain to employees how minor mistakes could have catastrophic consequences. There’s also a human cost to making avoidable errors. No one wants to have to sack staff when they fall victim to a phishing campaign, or social engineering attack.

SIM solutions

Another important issue in setting up an information security system is determining how to sort out all the data that floods in from security devices, such as firewalls, proxy servers, intrusion-detection systems and antivirus software. The IT team can quickly be overwhelmed because installing a better security system will increase rather than reduce alarm data. Companies ought to consider installing a SIM (security information management) technology that logs and sorts the data recorded by other pieces of software.

 

Larger organisations began using SIM systems a decade ago, but the market has boomed and they are now integral to security at many small-to-midsize businesses. Instead of IT security teams manually sorting reams of data, the SIM toolkit automates the process and normalises the data. It can translate Cisco, Microsoft, or CheckPoint software alerts into a common language. Many SIM suites include multiple applications to address different issues.

 

When deciding which SIM system to purchase, businesses need to consider the level of risk they face and whether it has the capacities they require. It needs to be scalable, so it logs information from hundreds, or even thousands, of devices in real time. It needs to cope with what Symantec calls “blended threats”, which could combine the characteristics of viruses, Trojan Horses and malicious code. Some businesses will want active response capability, meaning the SIM system takes immediate action based on the data. This option always needs careful installation to avoid unnecessary shutdowns of servers and blocked traffic if staff make innocent mistakes. Care has to be taken as well to negotiate interdepartmental politics. SIM requires complex integration and there might be delays as each department works out suitable access privileges.

 

Once the system is designed and installed, that’s not an end to the process. The organisation needs to set KPIs to monitor its effectiveness, then review major breaches. Bad actors are continually exploiting new technologies and vulnerabilities, and it will be essential to constantly deploy new tools, skills and procedures to counter them. Fortunately, technology companies are moving as fast as the criminals and all the tools are available to implement a strong and secure system.

Security

As digital transformation brings new threats and opportunities, firms must handle them responsibly and securely.

  • Why companies should monitor its network?

    Taking care of a company's private network should be a top priority.

  • Grow your business towards digital transformation

    Digital Transformation plans recognise the importance of being able to work on the go.

Cookies og dit privatliv

Vi bruger essentielle cookies for at gøre interaktioner med vores website lette og effektive, statistiske cookies for at vi bedre kan forstå hvordan vores website bruges og marketing cookies til at skræddersy reklamer til dig. Du kan styre dine cookie-præferencer ved at bruge 'Præference' knappen nedenfor, eller vælge 'jeg accepterer' for at fortsætte med alle cookies.

Cooke præferencer

Feltet er påkrævet

Vi bruger cookies for at sikre os, at vores website fungerer som det skal, eller indimellem for at yde en service til dig hvis du beder om det (som f.eks. at administrere dine cookie præferencer). Disse cookies er altid aktive, medmindre du sætter din browser til at blokere dem, hvilket muligvis forhindrer websitet i at fungere som forventet.

Feltet er påkrævet

Disse cookies giver os mulighed for at måle og forbedre ydelsen på vores website.

Feltet er påkrævet

Disse cookies placeres kun i tilfælde af at du giver dit samtykke. Vi bruger Marketing Cookies til at følge, hvordan du klikke på og besøger vores websites, så vi kan vise dig indhold baseret på dine interesser og for at vise dig personlig reklame. I øjeblikket accepterer du ikke disse cookies. Markér check boxen, hvis du gerne vil.