Step one: How secure is your company's information?
In this series of articles Stewart Twynham of Bawden Quinn uncovers the facts about information security, debunks a few of the myths, and provides some accurate, impartial advice that explains in layman's terms everything from firewalls to computing law.
We start our journey by discussing the state of information security awareness within businesses today, why security is so important, and identify the starting point for all security professionals ' your information assets.
In a recent survey, 96 percent of small businesses claimed that they were confident in the security of their data - blind optimism which probably explains why 97 percent of recently tested web applications were found to have "serious flaws" allowing everything from digital shoplifting to free access to confidential records, and why something like 92 percent of small businesses actually lost time and money last year due to some form of IT failure, malicious or otherwise.
- Threats and Vulnerabilities ' why is hacking so easy?
- Firewalls ' essential perimeter protection, and what they don't do
- Anti-Virus protection, its limitations, and dealing with Spam
- Good housekeeping, backup and physical security
- Training, acceptable use policies and legislation
- ISPs, Domains, Web design and Hosting
- The impact of new technology ' VPNs, WiFi, Broadband, et al
When it comes to domestic security, most of us are pretty clued up. We know what and where our most valuable assets are. We wouldn't just install a good front door lock, and then go out leaving all the doors and windows wide open. No-one would approach their estate agent for security advice or be crazy enough to think that by fitting a burglar alarm system then never turning it on, they would somehow be protected against arson.
Yet this is exactly what most businesses do and think when it comes to securing their computers ' and it's hardly surprising. Information technology can be very complicated, so businesses tend to get lost in the marketing spin produced by the countless IT vendors, resellers and ISPs. Businesses, particularly small businesses, then end up buying piecemeal 'solutions' for problems they don't fully understand for all the wrong reasons, install and use them incorrectly, believing themselves to be safe when they are not.
As a result, information security for most small businesses turns out to be a patchwork of technology with gaps you could drive a bus through. For example, 72% of businesses do not provide any form of security awareness training to their staff, which is interesting since 64% of users recently disclosed their password to a complete stranger at Victoria Station, and 79% of users would pass confidential information to an ex-employee ' even if working for a rival firm. 6% would have absolutely no qualms about deleting important data if they were asked to leave, but then 67% would have already stolen data to use in their next job anyway.
Another classic example is the widespread misuse of anti-virus software and firewalls, resulting in businesses being surprised when they are hit hard by viruses, hackers and worms such as MSBLAST. The trouble is, technology such as anti-virus software cannot properly protect you from many blended threats such as used by MSBLAST, or from worms and viruses before they happen. Only training and good housekeeping can do that. Information security is not a product ' you can't buy it from a reseller or ISP ' good information security is about awareness and process.
Secure businesses don't rely on technology ' they are aware of the risks posed to information assets right through their business. They understand the impact of threats ' be they worms, hacking, or something as mundane as a power failure in the US which could knock out their email. And they then prepare their systems, processes and perhaps most importantly ' their people.
Businesses depend on information
Imagine what would happen if your customers' most private information was posted onto your web site. Perhaps correspondence with the Inland Revenue, or their latest top-secret designs? Or if you couldn't access critical information because of a system failure ' and as a result you missed an important deadline? Or your staff couldn't work because none of your computers were functioning?
According to DTI figures, 44 percent of businesses suffered a malicious breach of their security last year ' and the average cost of a serious breach was around £30,000. Much of the costs came after the event ' clearing up the mess, paying for staff to sit around waiting for systems to return, customer churn, loss of reputation. To make matters worse, in order to prevent it happening again, they still had to buy the systems and implement the processes which would have prevented the losses in the first place. Poor information security seriously and negatively impacts profitability, cash-flow, balance sheets, customer confidence and legal compliance, to name but a few.
Enter the CIA
Mention information security to the uninitiated ' and they'll talk long and hard about products such as firewalls and anti-virus, which as you have already discovered are only part of the story. All true security professionals on the other hand will talk about 'information assets' and will refer to the CIA mnemonic, which stands for:
Integrity: safeguarding the accuracy and completeness of information and processing methods;
Availability: ensuring that authorised users have access to information and associated assets when required.
You don't have to have information stolen (loss of confidentiality) to lose money. Having information damaged (loss of integrity as a result of a hacker, virus, malicious user, wrong key press or even a lightning strike) can be pretty threatening. So too can loss of availability ' perhaps a virus has killed your server, or maybe the server has simply been stolen.
Assets can be physical (e.g. a computers, networks, etc), information (spreadsheets, databases, and word documents), software (applications, web sites) or services (anything from an email system to a heating system).
You start by building a comprehensive list ' detailing every asset within your business. Then against each, consider the costs that your business could incur should you lose confidentiality, integrity or availability of those assets, particularly information or services. You're not looking for 100 percent accuracy here ' the chances are you will be seeing figures of tens of thousands, hundreds of thousands or even millions of pounds worth of potential loss. The cost to your business of losing a customer database, an email system, or a week's work is unlikely to be just a few pounds'
If your business is obsessed with 'ROI' ' these figures are then a good starting point for justifying why you need to invest time and money in information security. Forget 'odds' for a moment ' hacking, viruses, worms, malicious users, hardware failure all happen every single day. We see plenty of businesses trying to protect assets worth millions using inferior or poorly installed equipment which possibly saved them, at most, a couple of thousand pounds. Even if the odds were small (they're not) ' the impact is huge, which means so too is the risk. Consider the simplified risk equation:
Risk = Chance of Occurrence (say, 44%) x Potential loss (huge)
If you are interested in odds, then consider these ' according to the Institute of Directors, 85 percent of companies that suffer a really serious incident cease trading within eighteen months.
Alternatively, you may be enlightened enough to view information security as being outside of 'ROI' ' and instead as a necessary expense of day to day computing ' just as you pay to insure and tax your car ' you pay to secure your network. This is fine, however you should never lose sight of the real reason you are doing this, i.e. to protect your assets. Accepting security as a day to day expense without first considering the assets you are trying to protect, or the potential losses, may result in you making less than optimal investment decisions.
Do I need to consult a professional?
It very much depends on your business and your aversion to risk. According to the DTI, just 6 percent of those in charge of information security are actually aware of the contents of ISO 17799, the internationally accepted benchmark for information security. It is vital to realise that information security is by no means an 'exact' science, but professionals within the field will be able to quickly:
- Identify your assets
- Estimate threats, vulnerabilities and costs (in order to asses risks)
- Manage your vulnerabilities to reduce and mitigate risk in the most cost-effective manner.
Just as in accounting or law, a little knowledge is a dangerous thing. An experienced professional will probably save your small business a great deal of time and money in the long run.
Even when businesses understand what assets they are trying to protect, they rarely understand the threats and vulnerabilities, so are unable to make good decisions about what to invest in and why. We debunk many of the myths surrounding hacking, viruses, worms and much more, explaining why the dangers for small businesses are both real and proximate.
Previous articles in this series
- Step 1 - Identify your assets
- Step 2 - Understanding the threats and vulnerabilities
- Step 3: Things that turn threats and potential loss into risk
- Step 4: The firewall
- Step 5: Tackling viruses and spam
- Step 6: Good housekeeping
- Step 7: Training, acceptable use policies and legislation
- Step 8: Domain name purchase and protection