Вы находитесь на странице: 1из 4

HOW DOES I NFORMATION SECURITY

I MPACT YOU?

Trusted Impact Pty Ltd, Level 4, 210 Albert Road, South Melbourne 3205
secure@trustedimpact.com, (03) 8623-2890

Reducing cost and increasing security


When enterprises grow, they often find themselves with a diverse
patchwork of disparate security technologies, policies, and
approaches all connected with workarounds and manual
interventions which are usually expensive and largely inefficient.
They also are a common cause of security breaches and failures.

When a security incident occurs, loss of productivity is inevitable and


the potential for public embarrassment or regulatory intervention a
distinct possibility. Having the right protection in place, along with
appropriate procedures and people, productivity should never be
hindered.

Tools are only as good as the people using them, so a good deal of planning and tailoring to your environment is still needed.
The most important assets of a business are its data, and taking care of business means protecting business data. Data means
customers, communication, cash flow, and productivity figures. Without it, companies risk losing a host of factors in addition to
direct revenue: reputation, market share and brand equity.

By understanding, prioritising, and securing sensitive information, enterprises can better manage the risks associated with the
ever changing world of Information Security, now and in the future, and avoid the perils of having to explain why it didnt protect
such information.

The Issue integration has traditionally focused on consolidating data


and applications. Although this is a valid approach, it is a long-
term, high-cost activity that must be balanced with the need
IT complexity can be attributed to many to demonstrate a more immediate return on investment.
factors, such as acquisitions, evolving
technologies, adherence to compliance With this business growth, enterprises inherit technology that
bodies, and organic business growth. Keeping the becomes outdated or that doesnt fit the big picture over
environment secure, seems to add more complexity and time. In addition, the people and processes and policies
higher cost, and typically drives enterprises to comply with supporting the technology becomes less effective. Before an
technology, rather than the other way around. However, this enterprise realises, its security architecture is misaligned with
may also cause some organisational politics to emerge, business direction, with expensive maintenance of outdated
whereby the IT department is forced into implementing legacy solutions, and becomes ineffective in protecting the
technologies that would impact on other areas of the information of the enterprise.
business.
Emerging technology providers
Acquisitions
Fear, uncertainty, and doubt, known as FUD in the
Continual business change and organisational consolidation, information security industry, is a popular tactic used to scare
whether from a merger or an acquisition or other event, customers into purchasing security mechanisms they may or
results in a patchwork of hardware, software, and may not need. Therefore, IT managers need to keep their IT
applications that rapidly need to work together as one strategy in line with how their business is changing. A well
solution. From the IT perspective, the response to business

Trusted Impact Pty. Ltd. ABN: 70 121 001 438 Page 1


thought out strategy, would allow or cater for projected Taking strategic action
growth of the business.

Mobility, for example, is the latest trend among enterprises


to help improve efficiency within their sales and operations
areas. This technology provides some great benefits,
however, without proper due diligence on this technology,
the enterprise is open to a whole wrath of security issues,
should it be implemented recklessly.

Compliance bodies

As enterprises evolve and grow, and as laws change,


businesses now need to conform to these often strict
regulatory bodies in order to continue doing business in these
industries that require it. These are usually driven by current
issues, such as identity theft, heavier regulation and the
introduction of laws such as Anti-Money Laundering/Counter
Terrorism Financing which may require software to be
Establish a baseline - a diagnostic approach
modified to be able to record specific data and undertakings.
In order to process credit card transactions, most financial
Information and the systems that process it are among the
providers require that organisations comply with PCI-DSS
most valuable assets of any organisation. Adequate security
(Payment Card Industry Data Security Standard) before they
issue a merchant ID. of these assets is a fundamental management responsibility.
There is a broad range of internationally recognised standards
Basically, if your enterprise captures sensitive information, and frameworks to use when performing security
someone out there wants it from cyber-criminals to law assessments some designed to address generic areas of IT
enforcement. Adhering to a recognised standard or
and networking, and some which are very specific in their
regulation helps to protect that information from being mis-
used. These standards set out guidelines on what is application.
perceived to be best practice in the industry.
It is our approach to use these reliable frameworks as an
Organic business growth important reference point and building blocks for our
projects. This ensures our clients can be confident that they
The success of your business is growing faster than your IT
are being evaluated against well established industry
department can keep up. Many startup companies
standards.
implement the bare basics to get their business off the
ground and focus on growing the business. But as the
However, we look to add additional value above and beyond
business grows, these same systems and processes become
inadequate to support the growing business. the common standards by tailoring them to reflect the
individual circumstances and unique client environments.
Size and Scale The approach that we use draws from a solid understanding
and experience with standards such as PCI-DSS, CoBit,
Medium to small companies get by with IT Managers who
must be broadly skilled to manage a diversity of issues, from ISO27001, AS17799, ACSI33, combined with our practical
keeping the LAN up and running, to fixing the Managing experience successfully performing risk reviews. This
Directors new operating system. By definition, the scale of framework is designed to help businesses meet the challenge
the business may not warrant an expert in Security that has of creating a security posture that corresponds to the threats,
the depth of knowledge to be able to streamline the risks and business demands they facewhile providing a
companys security assets. clear path to improving security levels as situations and
conditions evolve. It is designed to enable a better
understanding of your unique IT Risk Assessment program,
providing an effective roadmap for improvement and secure
environment for the business.

Trusted Impact Pty. Ltd. ABN: 70 121 001 438 Page 2


Understanding the business requirements and cost drivers Consolidate or relocate IT systems

Understanding the nature of the business is a fundamental Once the baseline has been formulated and tailored to the
key to successfully reducing cost in an organisation. Here, business, and the data has been identified and categorised,
companies must lead some healthy discussions and ask some the next step is to find out where it all lives. Is it spread
simple but critical questions across numerous systems or all sitting on the G: drive which
happens to be under the receptionists desk? What burden is
What business are we in? this placing on your backup strategy? Can these systems be
consolidated, and what about protecting the sensitive
Who are our customers? Who are our stakeholders? elements? Can some of these systems be hosted elsewhere?
Are you sure the data centre has been built to comply with
Is our business seasonal? set regulations and standards?
Are we influenced by unique events? Regulatory requirements
Are we transaction-intensive or a service based? The increasing emphasis on protecting data has many
regulatory drivers. For those companies that accept credit
All have a bearing on the IT strategy. A team with
cards for the payment of goods/services, there is the
representatives from all departments legal/compliance,
requirement to adhere to the latest Payment Card Industry
finance, IT, sales and product development should be
Data Security Standard. This standard applies to all
involved in developing the strategy, collaboratively.
merchants, and service providers that store, process or
Understanding the data transmit cardholder data.

All companies collect data in one form or another. By The Healthcare Insurance Portability and Accountability Act
analysing what data is collected and where it is stored, and (HIPAA) addresses security policies and procedures that
how it used is the fundamental starting point to ensure secure access, transmission and retention of personal
understanding this important company asset. health information. Therefore, protecting medical records is a
compliance issue for hospitals, insurance companies, medical
Which data is vital data that, if lost or stolen, would practices, laboratories, life sciences firms, and pharmacies. In
break the company? Australia, this is addressed by the Privacy Act 2001 and the
Health Records Act 2001.
Which data is critical data that, if lost or stolen,
would not cause the company to fail? The global financial world is impacted by Sarbanes-Oxley,
which dictates new policies and procedures for financial
Which data is not critical but useful? reporting and auditing. It affects public companies and their
accounting firms. It also addresses retention of financial
Additionally, is this data sensitive? A partial list could be: records. To be compliant, companies will have to adjust their
business processes to more rigorously protect their data.
Data Vital Critical Useful Other Sensitive?
eMail Yes Insurance companies, as well as regulators, are scrutinising
Financial Yes their clients data protection policies. Those firms whose data
Web server No is deemed at higher risk will pay higher premiums, since loss

of data translates into huge business losses. To mitigate their
eCommerce Yes
own risk, companies should consider suppliers data
Sales Yes
protection policies as well. If a supplier loses data, those who
Call centres No are closely linked could incur losses as well.
Support desks Yes
Internal support No
Portals Yes
Supply chain Yes
Legal Yes
Research and Yes
development

Trusted Impact Pty. Ltd. ABN: 70 121 001 438 Page 3


Standardise and automate core processes About Trusted Impact

By transforming the most basic day-to-day processessuch Trusted Impact is an Australian-owned, invested and focused
as procurement, budgeting and reporting an enterprise will company - meaning we truly care about the success of
become more efficient, and reduce cost. By lessening the Australian enterprises and have a deep understanding of the
burden posed by these non-core tasks, the business can more relevant issues in the local environment. Our approach is to
efficiently capture the professional value of its staff, and uniquely combine solid business knowledge and experience
deliver better performance and better value to its customers. with a deep technical understanding and expertise in
information security and risk management to define
By having an automated workflow solution for approval pragmatic, reliable solutions to improve your business. We
processes, many manual processes have become automated, are people driven to help other people succeed in their jobs.
driving the savings of time and money. The value of this "Its not just about technology; it's about helping your people
functionality with regards to security is that these processes become more effective".
can ultimately determine a users level of access to a system,
and can be used to enforce segregation of duties as it relates Competitive differentiators for Trusted Impact include:
to managing user access.
Business Driven - A unique combination of expertise to
Companies should be able to set up specific, easily scalable deliver business outcomes from a deep understanding of
workflow processes consisting of one or more related steps to technology
implement, approve, and execute tasks. For example, these
tasks may include creation, deletion, and modification of Demonstrable results - Improvement is about your
identities (user, groups, accounts or roles); user self- people and how they do work not just about
registration, partner (company) self-registration, technology. We understand the people and process
subscribe/unsubscribe to groups or roles. issues which must be addressed to achieve successful
business outcomes
Prioritise and adopt correct technologies
Holistic expertise - A unique blend of integrated network
Whether its a new ERP system to handle the process and IT expertise to deliver more holistic improvements to
workflow, or the latest and greatest technology to protect or a companys IT and Network assets
deliver your data, adopting the correct technology tailored to
your business is the right philosophy to take. Take the time Our people - Our strength is our people and their
to understand the technology, and how it can play a valuable expertise. We have formal programmes to develop and
role in making your business successful. incent our people to deliver exceptional client service.
Our investment in our people means our clients get the
Bring it all together best resources in the market.
Take the next step toward achieving the benefits of improving www.trustedimpact.com
your security posture, while reducing the costs associated
with it, by contacting a Trusted Impact representative and The Author
scheduling a Solutions Workshop. Trusted Impact consultants
can then work with your IT team to assess the value of Bill Callahan is a Principal Consultant with Trusted Impact Pty.
Ltd. He has over 20 years of Australian and international
consolidating your environment, help you understand the
expertise helping clients improve their businesses. For further
sensitive data you hold and store, and provide a roadmap for information, call us on (03) 8623-2890.
designing and implementing a consolidated robust security
infrastructure framework.

Trusted Impact Pty. Ltd. ABN: 70 121 001 438 Page 4

Вам также может понравиться