Information Risk is NOT Just an IT Issue

Just as your information assets are many and varied, your information risks are too.

Although secure information systems are of huge importance, technology is not the whole story. Not all information is stored on computers – it is physical too: it is filed in cabinets, carried around in folders, taken outside your office, it’s in peoples’ heads. It all needs protecting regardless of the medium it is stored on.

“If I want to know the risks to my information I ask my IT guy.”

The threats aren’t purely from cyber crime. Environmental incident, loss or physical theft are less newsworthy but equally dangerous and in some cases more likely. The human factor makes any business particularly vulnerable.

If you look at our recent post on the Top Ten Information Security Breaches , you’ll see a mix of scenarios – some arising from cyber attack but others due to a lack of physical controls or basic human error.

“What every organisation needs is parity and balance;the right mix of physical, procedural as well as technical controls – in line with your business objectives.”

Dave James, MD of Ascentor

Take a holistic view of information risk

An organisation’s information assets range from personal information on your customers to confidential company information and intimate staff details. Information risk needs strategic thinking and a wide view.Risk management is not about avoidance but balance: the right mix of physical, procedural as well as technical controls – in line with your business objectives.

Effective Information Risk Management is about identifying your most important assets and the threats and vulnerabilities you face as a consequence of the company doing business. What is the impact – can you live with resultant risk? If you cannot, take action to reduce the vulnerability or the impact. This action could be a roadmap, a strategic intent to solve the problem and reduce exposure over a period of time. In case of an incident, be prepared – have a plan for how you operate when your information is unavailable.

We strongly advise any Board of Directors to take a holistic approach to Information Risk Management – right across the business: physical, procedural, personnel and technical. Task each Board member to go and investigate risk in their area.

Which of your gates is open?

You’ll find more information on this holistic approach to Information Risk Management plus questions for each member of the Board in our discussion paper: ‘The Board’s Guide to InformationRisk’ .

Other posts you might like:


You may also be interested in:

Work from home cyber security myths

Cyber security myths home workers fall for

Home workers are a growing gateway to your data and systems. If they believe any of these popular cyber security myths, your security is at serious risk.

Cyber security working from home

Managing good cyber security when working from home - what employers need to know

Home working carries increased security risks, but it doesn’t have to be open season for cyber criminals. These tips will help you put together a robust level of cyber security for your home based employees.

Cyber Essentials is changing - our overview

As the IASME Consortium takes over the management of the certification of Cyber Essentials (CE) Scheme, we look at what the changes will involve and why the scheme is still very much needed.