| |
THE VIRTUAL OFFICE CAN BE RISKY BUSINESS
By MARK ESTEP Technology such as laptop computers, remote access to corporate data and systems, cellular communications and groupware has created a "virtual office" environment in many of today's businesses. These technologies empower people to perform beyond the walls of the office as we know it today and to interact more intimately with their customer. But for all of the positive changes wrought by information technology, it's vital to also consider the risks they pose and how to manage them. As the media recounts stories of scam artists stealing laptops at airports and thieves cloning cellular telephone numbers, companies of all sizes are increasingly concerned about the security of their technological systems and access to organizations' information and knowledge. Arthur Andersen recently interviewed dozens of corporate executives to compile a survey on "The Virtual Office At Risk." Among the most striking findings:
One explanation for this disparity between perceived risk and action is that many companies have a narrow view of business risk --defining it in terms of daily financial dealings. Risk must be redefined more generally, as any event or action that stops an organization from achieving its stated goals or business objectives. Managing business technology risk requires a holistic view that combines a knowledge of technology with a deep understanding of the business of business. While no person or organization is immune to the risks presented by technology, there are tools that help companies identify and control risks. One of the most potent tools for identifying risks is the Arthur Andersen Information Security Framework, a process that allows Andersen business advisers to identify, source and size all relevant technology-related risks. This Security Framework links directly to the Arthur Andersen Business Risk Model, another of Arthur Andersen's holistic risk control tools. Once the Information Security Risk Assessment has identified the business risks related to technology, the next step is to ensure that there are appropriate security risk management capabilities to handle these risks. The objective is to develop a cost-effective strategy that balances risk management efforts with your specific business risks. The Information Security Framework helps to achieve this objective by focusing on the four broad, interrelated risk management control elements (the right side of the scale):
It's also important to balance these four control elements against the information technology risks depicted on the left side of the scale:
This framework links business risk to the information security solution and focuses on specific layers in the information technology. However, it is not linked to specific technologies, nor to organizational structures. Another important part of examining technology risks is to redefine the notion of risk controls as inherently negative. Although they are typically perceived as constraints and boundaries that limit us as managers, there is more to it. Attempting to proactively assess and control all relevant business risk not only can help to stop bad things from happening, but can also allow good things to happen. Granted, when looking at where your organization's risks lie, you will need to allocate some resources to the vital few risks that pose the largest threat to function or process. However, in this search you are more than likely to find that some risks are being over-controlled. When these overprotected areas are identified, changes can be made to reallocate those scarce resources to more goal-oriented objectives. Companies are learning that technology can be both a friend and a foe. The more technology empowers and liberates the user, the more it generates inherent business risks for an organization. The challenge is to help control those risks without placing cumbersome security controls and limits on user access.
|