Risk //

Compliance

6/3/2013
11:21 AM
50%
50%

Can't Fix What You Hide

Willful ignorance may be bliss, but rarely is it compliant

The CEO I was talking with didn't understand his own company's compliance requirements. And he didn't want to understand them. He had delegated this, as many in business do, to his IT director. "Technology will fix this problem" is a common approach.

The company's IT director had actually made a good-faith effort to understand the compliance regulations. He had implemented a number of changes to his team's processes and procedures: new password rules, more detailed logging, database security changes, and so forth.

There are actually major problems with this all-too-common approach:

1. Much of compliance and security cannot be addressed through technology alone. Technology is a tool used by people. No matter how great the technology, the "people factor" cannot be ignored.

2. Hiding behind technology, or blaming it, is socially acceptable, unfortunately. Too many business leaders, technology leaders included, shrug off their role in compliance and security with a, "Well, we just need to update our computers," or, "Our servers need more security." This attitude is more than simplistic; it's inaccurate and potentially dangerous.

3. The IT team may be assigned compliance responsibility, but not adequately trained or enabled to deal with many of the regulations. To make this worse, businesses rarely spend the money to educate the IT team on these issues or to bring in an expert to help.

4. IT rarely has the authority to change either business processes or employee behavior. Assigning new passwords and securing databases will not make a system secure if employees have bad habits that leave important information open and available.

5. Many business leaders give only lip service to making priorities of security and compliance. They fail to understand these business functions are not options or add-ons, but, in reality, are outcomes of the business processes they oversee.

Everyone I talked with at the company in question told me security was important. Some even said they were certain their company was compliant with its industry's regulations.

The truth is, the company's leaders were actively deceiving themselves. Compliance is a headache no one wanted to take the time to deal with, and it was easier to assume someone else had already addressed the issue.

The assumption that company data is secure, even without testing or assessments, is common. Assuming compliance is accomplished with a simple IT checklist is common as well, and commonly encourages small risks to grow into enormous ones. The shock when data is lost or a compliance audit fails -- that's common, too.

Ignorance is bliss, but where compliance and data security are involved, it is also an invisible, but completely avoidable, danger to the health of your business.

Glenn S. Phillips does not want you to suffer from avoidable danger. He is the president of Forte' Incorporated where he works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. Glenn is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish. Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.