How prepared are you to overcome the misuse of AI

How prepared are you to overcome the misuse of AI

Overcome the Misuse of AI Have you ever considered that the AI system integrated into your organisation's computing infrastructure could possess a threat? What if it is indeed true? Will it wreck your entire organisation and cause massive breaches of sensitive information? We can only
Enabling Transformation Quickly With Agile Project Management

Enabling Transformation Quickly With Agile Project Management

Agile Project Management Lack of understanding and fear of failure in an enterprise setting is a combination that leaves most organizations paralyzed when trying to develop a digital strategy. In a survey conducted at the 2018 Enaxis Leadership Forum, most business leaders viewed digital transformation as

CONTRIBUTORS

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the ...
Secure Business Agility

The First Steps on a CISOs DevOps Journey

CISOs DevOps The marriage between DevOps and Security is rapidly gaining traction. Security is shifting from its former mindset of ...
Using Cloud Analytics To Improve Customer Experience

Using Cloud Analytics To Improve Customer Experience

Evolution of Cloud Analytics Moving data to the cloud, once considered a strenuous task, has now become commonplace in most ...

RECENT NEWS

Alibaba's on-demand online services unit valued at $30 billion: sources

Alibaba’s on-demand online services unit valued at $30 billion: sources

HONG KONG (Reuters) - Alibaba Group’s newly formed on-demand online services unit has rocketed in value to as much as ...
Capgemini in Gartner Magic Quadrant

Capgemini in Gartner Magic Quadrant

Paris, November 9, 2018 – Capgemini, today announced that Capgemini (Prosodie) has been positioned as a Leader by Gartner in its ...
Oracle Cloud Unveils New HPC Offerings to Support Mission Critical Workloads

Oracle Cloud Unveils New HPC Offerings to Support Mission Critical Workloads

Oracle Cloud Unveils New HPC Offering Oracle now provides a complete set of solutions for any high performance computing workload, ...
Amazon picks New York City, Virginia for $5 billion new headquarters

Amazon picks New York City, Virginia for $5 billion new headquarters

SAN FRANCISCO (Reuters) - Amazon.com Inc (AMZN.O) said on Tuesday it will build offices for up to 25,000 people in ...
The New Industrial Revolution – According to the WSJ

The New Industrial Revolution – According to the WSJ

The insert in today’s US print edition of the Wall Street Journal is called The New Industrial Revolution. The paper updates ...
Jennifer Marsh

The Business of Security: Avoiding Risks

The Business of Security

Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up to $575 billion each year. What’s concerning for CIOs is that risk assessment is placed solely on the IT department, even if the breach stems from BYOD and other personal systems.

Encryption Isn’t Enough

security

The traditional school of thought – especially with SMBs – is to encrypt data and use SSL or TLS on public systems. While this protects from eavesdroppers, it doesn’t protect from creative cyber threats that often phish for legitimate credentials from employees or contractors.

The latest big-time hacks circumvented encryption defense. The recent OPM hack that gave cyber criminals access to data covering millions of government employees and contractors wouldn’t have helped. Encryption protects data from being seen by unauthorized users and eavesdroppers, but OPM hackers had valid security credentials. They mimicked real login attempts, which circumvent basic encryption.

Even following common standards isn’t enough as Target discovered in 2013. Target lost 40 million credit card numbers to hackers who penetrated their point-of-sale (PoS) systems. You might think that Target oversaw some security standard, but the company was PCI compliant. PCI compliance is the de facto in credit card processing security, and Target’s security followed all the requirements. Regardless of its security implementation, hackers were still able to find a hole in the system.

Both OPM and Target have two things in common – the security hole was created by their own employees and vendors who gave up security credentials to phishing malware.

Assessing Risks Across Internal Systems

CIOs are tasked with providing employees with more mobility and freedom across the network while still creating a secure environment that’s hacker-proof. It’s not an easy task when you’re limited to what you can lock down.

Bring-your-own-device (BYOD) policies are a good start. Mobility is one of the fastest trending benefits for employees. BYOD lets them use personal laptops, smartphones and tablets for business. It’s become a part of corporate culture, and it offers more flexibility for employees to work at the office or at home. Before CIOs can implement a policy, they need to know the risks.

Mobility offers flexibility for employees and hackers. Mobile devices are even more vulnerable to viruses than desktops since most people have antivirus software on a desktop but not a mobile device. This leaves mobile devices wide open as a vector for trojan or virus injection onto the network.

Mobility isn’t the only risk. Telecommuting also gives employees the ability to work from home and saves in office resource costs. VPN connections allow employees to connect to the corporate network from any personal device. Just like BYOD security risks, these desktops could house malware that then transfers to the internal network.

VPN and BYOD are two hot topics in corporate security, but there are numerous others. Before CIOs can assure protection from cyber threats, they first must document each mode of network connection and assess risks associated with them. Even if the internal machine is completely anonymous to outside traffic using a firewall, it can still house vulnerabilities. It’s a team effort to assess risk, but it’s also a prudent part of IT asset management.

Creating Security Policies

risk-management

With both VPN and mobility risks assessed, CIOs can craft security policies that focus on flexibility for teleworking while still protecting internal resources. MDM tools track the number of mobile devices. IDS software identifies rogue, suspicious network traffic. IPS software tests servers and software for any common security flaws. Find the right tools on the market that make risk management more efficient.

CIOs and security experts are still new to mobility, so the commonality between most businesses is piecing together a policy that works for the business. It’s tempting to lock down systems and remove mobility altogether, but this type of policy isn’t feasible in today’s mobile market.

Quarantining mobile hotspots from critical systems is one way to manage risk. Users can share and store data on a segmented part of the network away from sensitive data, servers, and workstations.

Your policy should implement granular authentication and authorization that matches users with data they need to know. Classify information, so then security roles can be assigned to authorized employees. While this won’t guarantee protection, it will limit the amount of damage in case of a breach.

Training Staff

One of the most important parts of risk assessment and IT security is training staff. Protecting data should be a unified effort between all employees, vendors, contractors, and outside visitors.

Training is an ongoing effort from IT security staff that should integrate well into the on-boarding staff process. It’s not a process that’s limited to just employees. All executives, managers and employees should understand the risks and work to protect data from cyber threats.

In conclusion, reining in assets and risks and then applying the right security management is a huge effort for any CIO. Whether the business is small and growing or large and revenue-generating, a security policy should be a line of business that strategically defends against cyber threats and hackers.

By Jennifer Marsh

This post is brought to you by The CIO Agenda.

KPMG LLP is a Delaware limited liability partnership and is the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International. The views and opinions expressed herein are those of the authors and do not necessarily represent the views and opinions of KPMG LLP.

Jennifer Marsh

Jennifer is a software developer and technical writer. She's written technical content for IBM, Rackspace, Adobe, and Udemy and continues to write articles that help people understand the life of a coder.

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.