Story image

What does security mean to you?

21 Aug 2011

One of our clients subcontracts to an organisation that places a very high emphasis on security. To take their laptops onto that organisation’s site, they have to have a blank login account with virtually none of their data on the machine. The only application on the laptop is ours. It contains only the information they need for the site visit. When they return to their office, it downloads the information to the server and wipes everything about the site visit off the laptop itself.

Another recent project involved confidential interviews. While the interviews were recorded anonymously on netbook computers, we also ensured that during the subsequent download process they were sufficiently randomised that nobody could deduce which interview on which machine was which. Nor could anybody see the answers after the interview was completed, because it was vital to ensure the interviewee’s anonymity.

On another, smaller legacy site, we were called in to reconfigure a system to work on a server instead of a local machine. Unfortunately, we weren’t called in until an ex-employee had already left with a copy of the system, including the client list and about 10 years’ worth of sales records on a memory stick.

These are very specific and diverse cases that highlight the necessity of understanding just what security really means to you. Interestingly, not one of them involves credit card fraud, hackers, firewall breaches, encryption cracking or any other things security experts will tell you that you need to guard against.

That’s not to say you don’t need all these things; you do. But as a business person, you shouldn’t really know too much about the technical side of security. It is a highly specialised field, best left to the experts. What you do need to understand is how much security is relevant to your business. You need to understand your needs: what are the real threats to your business, and what is the most effective way to deal with them?

For instance, in the memory stick case, the need is to restrict access to sensitive data without otherwise encumbering staff. It is quite easy for your IT people to implement a set of restrictions that prevent anything being copied onto a memory stick. However, this can be somewhat restrictive in practice, as there are many perfectly valid reasons for staff to use memory sticks. It is more appropriate to locate the sensitive files in a secure location on a server so that staff can access them for bona fide purposes but cannot copy them.

How about access to data within an application? Do you let your staff have access to your accounting program? Have you restricted their access by use of accounts and passwords so they can only use the parts they need to use? Are they properly trained? Can they export data? Or edit it, or delete it? Are you sure?

A regular request for us it to build a front-end to an accounting system that lets staff perform their various functions, but completely obviates the need for non-admin staff to have any access to the accounting program at all. This sort of thing becomes much more relevant as mobile computing starts to become a mainstream event. It is not just a case of preventing people from hacking into your systems; there is increasingly a very real issue as to knowing who is actually at the keyboard at the other end, and controlling just what they are doing offsite. Even for the same staff member, it can be a very real consideration to decide that what they can do ‘in-house’ is not the same as what they can do while ‘on the road’. And if you reach that conclusion, then you are going to have to decide how to implement it.

One last thought: how do you know your IT people are doing the business re: security if you can’t be expected to understand it all? In short: peer review. Periodically, get one of their competitors in to have a look at your system. They will be pitching for your business, so you may have to take it with a pinch of salt, but they may well uncover some interesting issues.

Matthew Roscoe is co-director of Foundation Business Software. Go here for more.

Need the perfect flatmate? AI can help
A Kiwi entrepreneur has developed a flatmate-finding service called Mogeo, which is an algorithm that matches people to the perfect flatmates.
GoCardless to double A/NZ team by end of year
With a successful E round of investment and continuing organic growth globally, the debit network platform company aims to expand its local presence.
NZ’s Maori innovators are on the rise
“More iwi investors need to recognise that these sectors will provide the high-value jobs our children need."
Phone ringing? This biohack wants you to bite down and ChewIt
So your phone’s ringing, but instead of swiping right or pushing a Bluetooth button you bite down on a tiny piece of tech that sits in your mouth.
How big data can revolutionise NZ’s hospitals
Miya Precision is being used across 17 wards and the emergency department at Palmerston North Hospital.
Time's up, tax dodgers: Multinational tech firms may soon pay their dues
Multinational tech and digital services firms may no longer have a free tax pass to operate in New Zealand. 
Spark’s new IoT network reaches 98% of New Zealand
Spark is the first company to confirm the nationwide completion of a Cat-M1 network in New Zealand.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.