Advertisment

SECURITY: The Danger Is Real

author-image
DQI Bureau
New Update

The myth that India is not yet computerized enough to worry about IT security
is fast disappearing. It has not just become pertinent to have a clear security
policy in place, but is also time to take stock of the wreckage that has already
occurred. A recently conducted PwC-CII IT security survey revealed that of the
60% organizations that reported problems due to breach of security, 21% have
recorded actual loss in revenue. It is interesting to note that about 58% of the
organizations have still not been able to quantify the loss. "Till recently
the industry believed that actual problems are much less than the perception.
But they need to understand that this is not something that would not hit them.
Damages in terms of cash loss, information loss and others have already
happened," says Neel Ratan, head, operations and risk management,
PricewaterhouseCoopers.

Advertisment

The security scenario in India can best be termed as grim, with half the organizations working with an “informal policy”While the new economy has created a better workflow through improved means of
communication and technology, the IT revolution has come with its own dangers.
With increasing automation of business processes and networking of systems,
security breaches are now becoming common among Indian companies. Although
awareness about the issue has set in, stringent measures have not yet been
taken. Only 5% of the survey respondents reported a revenue loss of over Rs 5
million. Ratan explains that this is not because Indian companies are less prone
to losses, but because of the fact that most of them have not been able to
figure out the actual amount of damage or the reasons behind those damages.

Security breaches

Among the security breaches that usually affect organizations, proliferation
of viruses and the resultant service outages or loss of revenues are some of the
major concerns across the world. The present measures taken up by corporates are
not adequate to prevent virus attacks or detect security breaches. Ratan points
out that most companies install a firewall and believe that they have secured
their systems, but they don’t realize that the system has to be configured
properly to achieve optimum results. "Lack of understanding of technology
is a big drawback. The fact is that most people have only been able to exploit
only 10% of their firewall systems," he says.

Advertisment

Poor tracking mechanisms plague organizations–causes for half the security breaches couldn’t be traced. A “CISO” becomes important in such a scenarioApart from viruses, among the other major reasons for security breaches could
be manipulation of software, data or programs, unauthorized entry, theft of data
and fraudulent or illegal use of material. Although most Indian companies are
realizing the need to install proper detection systems, as of now they still
depend on information from employees, or, collect data after the material damage
is already done. "The bulk of security breaches are identified by the
problems they cause. The use of preventive techniques such as firewalls or
intruder detection systems in India is still only one-third as compared to
organizations globally," says Ratan.

Another danger to security that has come to notice is related to employees
moving to competitive organizations. People in key positions usually have access
to all critical data that can be misused by a competitor. According to Ratan,
this is a problem which is usually difficult to identify, but can be prevented
through stringent in-house security policies. "The technology, to make sure
that critical plans of the company are not leaked, is available," he says.

Identifying the culprit

Advertisment

Whether globally or in India, most companies see identifying culprits a major
problem. The fact that over 48% of the surveyed organizations that faced a
security breach could not identify the culprit reflects the lack of adequate
security detection measures. 23% of the companies believed that it was carried
out by a hacker or terrorist, 26% believed authorized/unauthorized users of the
system to be the prime suspect and only 8% found former employees to be the
culprits.

The Internet, while improving the reach and productivity of an organization, also bares its vital data to millions of other Net users. Poorly defined security policies can only compound such risksOne of the major reasons that have led to security issues is the pace of
changing technology. In a hurry to deploy the latest techniques, security
concerns seem to have taken a backseat. Says Ratan, "In an eagerness to
keep up with the dot-com boom, most companies have hurriedly created huge
infrastructures without ensuring their security. They usually feel they can
tackle it later, but this attitude can be very dangerous." The survey
indicates that 50% of the companies selling via Web sites reported a revenue
loss as compared to only 25% of other companies reporting the loss.

Complexity of technology <22%> and lack of trained manpower to effectively
implement and monitor security for systems <20%> are among the other barriers to
implementing security. Although high costs of security-related hardware and
software have constrained IT managers in allocating adequate budgets for
effective security set-ups, it has been observed that lack of understanding of
technology is a greater constraint. Sometimes an attempt to get hurried and
cost-effective benefits from IT also results in hampering security.

Advertisment

Realizing the importance of security, some organizations have started making
efforts in the direction, but most of them are restricted to the "quick
wins" or basic security solutions. Those security implementation measures
that rank higher on the technology curve, like intruder detection tools,
penetration testing, encryption technologies and formal security architectures
have been used by very few organizations. However, one good thing is that most
of the organizations are focussing on increasing end-user awareness <61%>,
implementing access controls <59%> and increasing security reviews or
assessments <45%>.

Lack of security policies

Although the awareness regarding the criticality of IT security seems to be
increasing, a large number of organizations still need to have clearly defined
security policies. "It is obvious that organizations with well-documented
security objectives and policies have been more successful in implementing them
as compared to those with informal policies," says Ratan. While 74% of the
respondents in the survey stated that information security was a high priority
for their businesses, the sentiment was not reflected in the quality of their
security policies. Less than one-fifth of the total companies had a complete
description of the security measures while 57% of the companies had an informal
policy or no policy at all.

Advertisment

In a bid to win in a highly competitive environment, companies are spending
heavily on innovation and technology, but the budgets allocated for ensuring information security have been astonishingly low.
Ideally, an organization that does business over the Net needs to allocate at
least 15% of its spending on security. But the survey indicated that a high
number of corporates <54%> reported a spending of less than Rs 0.5 million,
while another 32% spent only Rs 0.5—1 million.

Another trend observed in Indian companies was their inability to
differentiate the security of knowledge as a separate function. It was either
clubbed with the functions of a CEO or CIO. This is reflective of a low security
priority as compared to the developed markets where most of the organizations
have dedicated chief information security officers (CISOs), who design and
implement information security measures. In India, the CISO is not even a
prevalent post. In most cases <38%>, the security policies are determined by
CEOs, closely followed by CIOs <37% cases>.

"The growing need for more comprehensive security measures will drive
more corporates to establish formal CISO positions. The activities of a CEO or
CIO have to be differentiated from the functions of a security officer,"
says Ratan.

Advertisment

As businesses move towards collaboration and as the Internet is increasingly
used for important functions like supply chain and content management, the need
to exercise caution is even greater. With e-commerce becoming a reality, more
and more monetary transactions will be conducted over the Web, which can lead to
more financial losses if the right security mechanisms are not in place. The
onus ultimately lies on individual organizations to wake up to the reality and
face the challenges.

SHWETA VERMA

in New Delhi

Advertisment