Wednesday 10 May 2017

Andmeturveː tehnoloogia, koolitus ja reeglid. Nädal 13

In today's article, it's about IT risks.

Throughout the world, there is a tendency to underestimate IT risks (only 1% of the surveyed experts estimate this area as the most exposed to risks). In reality, a violation of the functioning of IT systems - caused by hacker attacks or imperfection of internal processes - immediately entails multi-million losses.
Ensuring information security is one of the main tasks of a modern enterprise. The threat can be presented not only by technical failures, but also by the inconsistency of data in various accounting systems that almost every second company meets, as well as unlimited access of employees to information.
IT-risks can be divided into two categories:
  • Risks caused by information leakage and use by competitors or employees for purposes that could  damage business;
  • Risks of technical failures in the operation of information transmission channels, which can lead to losses.
Work to minimize IT risks is to prevent unauthorized access to data, as well as accidents and equipment failures. The process of minimizing IT-risks should be considered in a complex way: first possible problems are identified, and then it is determined by what methods they can be solved.
So how to minimize IT risks?
As the experience of many companies shows, the most successful strategies for preventing IT-risks are based on three basic rules.
  1. The access of employees to the information systems and documents of the company should be different, depending on the importance and confidentiality of the contents of the document.
  2. The company must control access to information and protect the vulnerabilities of information systems.
  3. Information systems, on which the company's activity directly depends (strategically important communication channels, document archives, computer network), should work smoothly even in case of a crisis situation.
In conclusion, I add that these rules will not do any good if the company's staff is not trained in the basic rules for using the system and do not understand the importance of their work.
The principle and logic of work should be clear to everyone. Every employee must understand their responsibilities and fulfill the basic requirements for the preservation of personal data and data of the organization. If these requirements are not met, then sooner or later an attacker will be able to find a loophole and take advantage of the employee's incompetence.
Peace to all and a minimum of IT risks :)

No comments:

Post a Comment