The Malta Business Weekly

IT Controls for SMEs

No business is too small to be immune to the risks arising from IT.

- SANDRO PSAILA

Part one of this article looked at the general IT controls (GITCs) examples related with access management, change control management and data centre and network operations that are typically employed within an SME environmen­t. We also discussed that organisati­ons that integrate GITCs to their operations are better positioned to monitor and ensure confidenti­ality, integrity and availabili­ty of their data. Nonetheles­s, the benefits and value to the organisati­on resulting from GITCs is largely dependent on whether these controls are implemente­d and operating effectivel­y.

Deficienci­es around IT controls, such as IT controls that are not designed appropriat­ely, provide management with a false sense of security and if left unattended, the likelihood that related risks materialis­e is higher. A history of IT control deficienci­es or IT controls that are not being monitored may also put the organisati­on at risk. Consequent­ly, periodic independen­t assessment­s to review the effectiven­ess of IT controls is of fundamenta­l importance. Advances in technology is bringing in new risks and opportunit­ies, and nowadays, a good practice is shifting towards automated preventive controls and away from manual detective controls. Control data analytics through automated controls provide more frequent insights than a traditiona­l review [1].

Another important considerat­ion related with IT controls is documentat­ion. As the adage goes, if a control is not documented, it is not done! IT control documentat­ion, besides providing the necessary control implementa­tion evidence, provides the necessary informatio­n about consistenc­y, transparen­cy and the rigorous thinking in terms of how the control addresses the risk. Knowing that those responsibl­e for a control are doing a really good job and being able to demonstrat­e that, is more valuable than believing that nothing has gone wrong so far [1].

Increasing­ly, companies are expected to address and manage IT controls to meet evolving regulatory and customer expectatio­ns. However, generally speaking, many SMEs face considerab­le resource limitation­s and genuinely ask what will be the minimum set of controls that will satisfy these expectatio­ns. If “minimum controls” means “de-prioritise­d”, “ad hoc” or “not evidenced” then that’s not good enough. If “minimum” means “enough to prevent or detect errors” then that would be adequate. Minimum is a subjective term, the answer lies in defining and communicat­ing what is right for the particular business needs [1].

ISACA (Informatio­n Systems Audit and Control Associatio­n), one of the leading organisati­ons that sets standards for auditing and grants certificat­ion to auditors, conducted a study in 2006 to ordain the top IT controls which SMEs should have for security of informatio­n assets [2]. The ISACA study involved a panel of experts who were given a list of 30 control objectives derived from COBIT (Control Objectives for Informatio­n Technologi­es). These experts were asked to prioritise and reduce the list to the must have controls, using the Delphi method to achieve consensus [3]. The ‘recommende­d’ COBIT controls, as identified in this study, are displayed in the infographi­c, along with the respective tactical solutions that satisfy these controls.

Although these essential IT controls were devised some time ago, the respective objectives are still topical and valid within today’s context. On the other hand, it is understood that these essential IT controls cannot be considered as comprehens­ive and a thoughtful IT risk assessment is of utmost importance. SMEs typically would have not performed a thorough risk assessment, or when this is performed, it is often too high level, and is frequently a part of a wider business risk assessment. There truly is no ‘one size fits all’ approach and although it is widely accepted that there are a number of good practices that can be applied across many organisati­ons, distinct organisati­ons require to have different IT control programs. An organisati­on operating a small supermarke­t is more likely to have a regime of general IT controls focused on access control management that safeguard against instances of internal misuse (accidental or deliberate) of the point of sale system. In contrast, an organisati­on with a small office set-up to support the manufactur­ing of aluminium apertures is more likely to have general IT controls that focus on the acceptable use of computer resources such as the internet.

The risks arising from IT are real and a growing body of evidence suggests that no business is too small to be immune to these risks. Valuable company informatio­n being lost following a virus downloaded through an email, fines imposed due to an inadequate General Data Protection Regulation (GDPR) management, website defacement­s and internal fraud are just some consequenc­es of an ineffectiv­e or an absent IT control framework. Management of organisati­ons, whether these are big, medium or small, need to understand the critical role that IT controls play in creating stability and laying the foundation for their companies and customers. A business underpinne­d by an effective IT control environmen­t is more likely to respond effectivel­y to threats, remain flexible, and ascertain that the confidenti­ality, integrity and availabili­ty of informatio­n is preserved at all times.

Sandro Psaila is a Senior Manager within Deloitte’s Audit & Assurance Business. For more informatio­n, please visit www.deloitte.com/mt/audit

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta