Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

6/3/2013
11:21 AM
50%
50%

Can't Fix What You Hide

Willful ignorance may be bliss, but rarely is it compliant

The CEO I was talking with didn't understand his own company's compliance requirements. And he didn't want to understand them. He had delegated this, as many in business do, to his IT director. "Technology will fix this problem" is a common approach.

The company's IT director had actually made a good-faith effort to understand the compliance regulations. He had implemented a number of changes to his team's processes and procedures: new password rules, more detailed logging, database security changes, and so forth.

There are actually major problems with this all-too-common approach:

1. Much of compliance and security cannot be addressed through technology alone. Technology is a tool used by people. No matter how great the technology, the "people factor" cannot be ignored.

2. Hiding behind technology, or blaming it, is socially acceptable, unfortunately. Too many business leaders, technology leaders included, shrug off their role in compliance and security with a, "Well, we just need to update our computers," or, "Our servers need more security." This attitude is more than simplistic; it's inaccurate and potentially dangerous.

3. The IT team may be assigned compliance responsibility, but not adequately trained or enabled to deal with many of the regulations. To make this worse, businesses rarely spend the money to educate the IT team on these issues or to bring in an expert to help.

4. IT rarely has the authority to change either business processes or employee behavior. Assigning new passwords and securing databases will not make a system secure if employees have bad habits that leave important information open and available.

5. Many business leaders give only lip service to making priorities of security and compliance. They fail to understand these business functions are not options or add-ons, but, in reality, are outcomes of the business processes they oversee.

Everyone I talked with at the company in question told me security was important. Some even said they were certain their company was compliant with its industry's regulations.

The truth is, the company's leaders were actively deceiving themselves. Compliance is a headache no one wanted to take the time to deal with, and it was easier to assume someone else had already addressed the issue.

The assumption that company data is secure, even without testing or assessments, is common. Assuming compliance is accomplished with a simple IT checklist is common as well, and commonly encourages small risks to grow into enormous ones. The shock when data is lost or a compliance audit fails -- that's common, too.

Ignorance is bliss, but where compliance and data security are involved, it is also an invisible, but completely avoidable, danger to the health of your business.

Glenn S. Phillips does not want you to suffer from avoidable danger. He is the president of Forte' Incorporated where he works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. Glenn is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish. Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7822
PUBLISHED: 2020-08-04
DaviewIndy has a Heap-based overflow vulnerability, triggered when the user opens a malformed image file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7823
PUBLISHED: 2020-08-04
DaviewIndy has a Memory corruption vulnerability, triggered when the user opens a malformed image file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-6012
PUBLISHED: 2020-08-04
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems.
CVE-2019-20001
PUBLISHED: 2020-08-04
An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.
CVE-2020-15467
PUBLISHED: 2020-08-04
The administrative interface of Cohesive Networks vns3:vpn appliances before version 4.11.1 is vulnerable to authenticated remote code execution leading to server compromise.