Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
People: Most Important, But Weakest Link In InfoSec Chain
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • People: Most Important, But Weakest Link In InfoSec Chain

People: Most Important, But Weakest Link In InfoSec Chain

FP Archives • February 2, 2017, 23:35:20 IST
Whatsapp Facebook Twitter

What does it take to weave information security into the fabric of the organisational ethos, as a means to attain sustainable long term business value?

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
People: Most Important, But Weakest Link In InfoSec Chain

How much would you pay to buy a seat-belt, were it not required by law? Answers to this question (at least to the few folks that I posed it to) range from ‘Nothing’ to ‘Rs. 500’! A great value to put on your life, isn’t it? Someone said that people would pay more to watch dancing pigs than on their security. Perhaps it is true. Security, to most of us, is that distant, over-hyped syndrome that affects only other people. After all, we routinely find ourselves in long metal cylinders hurtling through the skies at the speed of sound, carrying a thousand gallons of extremely inflammable fuel and relying on over a hundred thousand moving parts built by the lowest bidder! What could be a bigger security risk than THAT? And yet, here we are, reading about it…

STORY CONTINUES BELOW THIS AD

Our experiences and attitudes to security in our everyday lives determine our perspective on information security in the workplace. This is the perspective we bring to work, and it guides us in our handling of myriad situations each day. The point here is that concern for security is very intrinsic to our behaviour – if we do not regard it as an important enough factor in our lives, it is unlikely that we will give it due importance when it comes to data at our workplace.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Successful enterprises invariably adopt a well-thought-out and proactive approach to managing information security, in matters relating to their customers as well as corporate affairs. The question is, what does it take to weave information security into the fabric of the organisational ethos, as a means to attain sustainable long term business value?

Building A Security Culture

I recently read in the newspaper about a credit card fraud perpetrated by some young employees of a prominent call centre in Gurgaon, engaged in providing marketing services to an international client base. Not an isolated piece of news, unfortunately. The question that many of us would like to ask is, could the organisations concerned have done more to protect their clients’ privacy from the threat within? The good part is that while such incidents do occur, they are not rampant, and obviously this points to a degree of awareness and efficacy, if not infallibility, of the measures undertaken by most companies.

The bad news is that while most companies do have systems of accountability and controls in place for, say cash transactions by employees, partners, contractors, they still do not have the same stringent rules for information assets. Even in this Information Age, it is disconcerting that we tend to undermine the value of information, and gloss over the potential for its misuse. This is not, one hopes, a result of fraudulent intent (at least always), but of collectively unenlightened security behaviour, whose potential for havoc has been grossly underestimated.

STORY CONTINUES BELOW THIS AD

Policies Alone Not The Panacea To Security Woes

Today, we measure information mostly in terms of its volume, and not its value. An acceptable security culture requires that every employee, across levels and functions, pledges to recognise the value of the information that he comes across and makes it part of his/her intrinsic behaviour to protect it from misuse. Most organisations do have an information management policy in place which everyone is required to sign up to, but obviously this by itself is not adequate to make information security part of the organisation’s DNA.

Companies feel safe and secure in the knowledge that they have appointed a Chief Information Security Officer (CISO) and are thereby assured of full security compliance at all times by all people. Nothing could be farther from the truth. A CISO lays down the norms and processes, prescribes the right security frameworks, imparts awareness about information security through periodic refresher programs, prepares and implements the roadmap for the organisation’s security journey - and the like. But no CISO can usher the security culture that is mandated by today’s information revolution, where each of us, at every waking instant, can directly or indirectly gain access to unprecedented amounts of sensitive information.

STORY CONTINUES BELOW THIS AD

There has to be built-in sensitivity and situational awareness that transcends all triggers and temptations. In most cases, this is related to trust in the employee, which makes many organisations stop in their tracks. Most companies spend millions in building and hardening their perimeter security, firewalls, and digital fortresses but in the process ignore the threat from within. It is not about mistrusting employees. A lot of breaches happen inadvertently, or out of ignorance. Most often, employees are completely unaware of the consequence of their seemingly innocent actions.
Building a sustainable security culture requires across the board effort in creating an awareness of security risks and an appreciation of the value and sensitivity attached to information that passes through the hands of each employee. Tools such as authentication, Identity Management and encryption do play a role but do not substitute inborn awareness that is repeatedly percolated down from top management. This awareness means that each employee recognises the importance of the information the he or she is entrusted with and deals with it with uncompromising care – which includes isolating it from friends, family and associates, however compelling or tempting the alternative may seem.

STORY CONTINUES BELOW THIS AD

Frequently Overlooked Aspects

Be Aware Of The Threat Within: Many companies spend a significant amount of effort and money on hardening their perimeter security – building impenetrable firewalls, multi-layer security protocols for their LAN and WAN, setting up probes to detect malware, and the like. Which they well might, as tradition dictates that attacks from outside must be defended. The problem is that in the process we tend to ignore other equally potent threats which are today the cause of much more grief than vulnerabilities in the fortress.

A Sustainable Security Culture: As we already discussed, a sustainable security culture that makes security everyone’s concern is a pre-requisite not just for secure IT environment, but for business competitiveness. Yet it is one of the most frequently overlooked aspects of security. Most organisations tend to take corrective, rather than preventive, action. Awards for safety and security are common in manufacturing units, but it is rare to see IT Security Awareness awards in most companies’ R&R functions.

STORY CONTINUES BELOW THIS AD

End-point Security: End-point security is another overlooked aspect of security. When we move in metro or local trains, buses, planes on our regular commutes or business travel, we carry years of sensitive company information in the form of files and emails on our laptops, smart phones or BlackBerrys. The over-riding thought in our minds is the loss of the physical device, which we tend to squeeze tighter under our armpits. In the process we do protect the data as well, but yet the appalling risk of high volumes (and value) of company information traversing through the city (or country) on individual devices is not recognised for its full potential for damage.

The DLP Factor: I heard of a case where an employee had been copying sensitive documents on a personal hard-disk just days preceding his resignation from the company. It was later learnt that this gentleman had left to join his company’s biggest and closest competitor. It was too late to do anything other than weak protestations based on the original employment contract. But it was too little, too late. I am sure such instances are not common, but even one such case is enough to bring an organisation to its knees. Yet we often overlook the aspect of data loss prevention, primarily because we tend to relate it to trust in the employee. I am an employee. Yet if I have to abide by a rule that restricts copying or distribution of company information, I will most certainly respect it. After all, I am not allowed to distribute the company’s cash or capital assets but that doesn’t imply a lack of trust in me. Why should the same not hold for valuable information assets? This is yet another overlooked area of information security whose potential for damage is either not yet understood, or simply ignored.

STORY CONTINUES BELOW THIS AD

Tools And Tech Can Only Do So Much

To conclude, let’s go back to the opening remarks in this article about putting a value to a seat-belt. The fact is that we do value our lives – irrespective of the value we place on a seat-belt, a proven life saver. But the point here is that we do not envisage our becoming victims, or being in a situation where a seat-belt would indeed be a life-saver. Similarly, most of us do appreciate that breach of information security could be catastrophic. But we assume it won’t happen – at least to us. That’s the mistake most of us make and realise it too late.

Tools and technology can only do so much. The most important, and at the same time the weakest, link in the information security chain are people. Awareness, enlightenment and education are the best protection against security threats. A culture of security – which promotes automatic and intuitive grasp of security risks and threats, which empowers people to take action and most importantly, where people are trusted with information and assets – can do a lot more than technology can ever do. Technology is like a lock – it is outside the door, and can be picked. A deep-rooted and widespread security culture on the other hand, is the key that unlocks the combined power of the entire organisation to fight and win against all threats to its security and business.

Tags
Tata Teleservices CIO Security IT Security Ashish Pachory
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV