Filter by Category

IT Security Threat Reaches Executive Level

The success of a company now relies on its ability to secure critical data.  When escalated to this level of importance, it's time for the CEO and board to become directly engaged in the process.

The traditional role of IT has changed significantly in recent years.  IT professionals, previously tasked with configuring office computers and network servers, are now entrusted with securing trade secrets and highly sensitive customer records.  Add to this a surge of cloud-based applications and storage that make an organization's data vulnerable and the IT department suddenly has a very full plate.

Organizations are being targeted primarily for the purpose of financial gain.  Customer records often include sensitive data that can be easily monetized, providing ample motivation for both hackers and internal threats.  As companies increase their digital assets -- through the harvesting of more customer personal, financial and transaction information - they become a higher profile target for thieves.

Failure to Recognize a Breach

single sign-on breachFirewallThe challenge often seems to be detecting and resolving intrusions.  Sometimes the first notification of a breach comes from federal investigators who've discovered the organization's data on the open market.  Even when signs of suspicious activity present themselves, too frequently the threat is not given proper escalation.

Of greatest concern is the timely reporting of incidents through the levels of company leadership, regulatory authorities and, ultimately, the effected parties. The IT department might feel compelled to research and resolve the breach before notifying senior management.  This can turn a potentially damaging situation into a public relations nightmare.

Common Language is Key

The solution begins with establishing a communication channel and common language between business and IT leaders.  Together they must understand and agree upon the level of risk the organization is willing to tolerate.

These marching orders allow the IT department to make a plan that meets these strategic needs.  Once completed, the gaps, priorities, and strategy needs to be communicated back to the CEO and board in a language that top leadership can understand.

Lastly, don't deny the limitations of your IT department.  The complexities and rapidly changing nature of security breaches may require the assistance of outside expertise to keep systems and procedures current.

This post is based on a TechRepublic article by Michael Kassner titled, "C-level execs need to rethink IT security".  

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


Five Secure File Transfer Alternatives to FTP

February 21, 2019

The Need for Secure File Transfer Protocols Back in the day, File Transfer Protocol (FTP) was the go-to protocol for sending files. It was a simpler time, and security was far less of an issue than…


Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

February 14, 2019

Free SFTP Software vs. Enterprise-Level SFTP Software In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items…


What is Secure File Transfer?

February 5, 2019

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size…


9 Ways to Use GoAnywhere’s Cloud Connector Integrations

January 29, 2019

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating…


Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

January 21, 2019

Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has…