March 4, 2017 – It is a simple question that is asked when someone needs proof that some piece of knowledge needs to be validated in some way and typically leads to follow-on questions.
So, when it comes to information risk let me ask you… “How do you know?”
How do you know what is the risk to your technology infrastructure or the information that you use? Have you identified the risk to your business? Identifying risk will help your organization (micro, small, medium, to mega sized) begin to prepare to address the risks that can present themselves to your business. In some industries, there are mandatory requirements to address risk via a risk assessment (HIPAA, PCI, etc).
The process of assessing risk is straightforward. To begin, identify what you have that could be at risk (databases, intellectual property, web site, servers, computers, users, network, etc.) Of those items, if something were to happen to them, what would be the impact? The loss of a laptop might not be considered, but what if that laptop had confidential or health care related information on it? Then the impact would be high.
In order for risk to be realized against those devices, there needs to be a vulnerability. A vulnerability is a weakness that would allow a threat to be successful in disrupting the organization. Vulnerabilities come in different forms. They could be a vulnerability in the computer’s operating system or software. They could be in a physical form, for example having a customer service window that would allow access to information or devices nearby.
Once you have identified what could be at risk and the associated vulnerabilities, think about what might disrupt your business operation or affect the business’ brand if those items have vulnerabilities that are subject to various types of threats. Identifying the threats can be the fun part. For example an attack by Godzilla or aliens from Mars. Yes those are unrealistic and the risk from those particular threats are extremely low if not zero. So they are discounted. However realistic threats to your business may come in the form of examples listed below. Don’t forget that the threat can be accidental or intentional, include both types of threat when identifying risk. There can be many more than that, it is up to you how far to go in identifying the threats.
This is just the first part in dealing with risk. Identifying the what, how, and why of risk to your business critical information is followed by addressing the risk and then making a determination on those items that can’t be addressed.
For the second year in the row, we are proud to sponsor Delaware’s Cyber Security Workshop.
The workshop will be held at the Dover Downs Casino in Dover, Delaware on 7 September.
The event is free, however does require advanced registration.
For more information on the event and to register please see…
Information Assurance is more than just simply protecting the information. It is about properly identifying and classifying information.
Knowing the information is the key. If you don’t know the information you cannot properly classify it. I know of a company that lost a multi-million $ contract due to not knowing the information. Which… because they did not know it, misclassified the information resulting in a loss of Information Assurance.
In addition to loosing the contract, the company will likely have to spend several thousand dollars to have their computers scrubbed to remove the classified information from their computer systems not authorized to process that data.
No your information!
Think twice and perform a cyber 360.