The Freeman

Digital transforma­tion and informatio­n security

-

IT and business leaders are increasing­ly under pressure to find ways to apply digital practices to business processes and operations. However, many analysts point to a large divide between the goal of digital transforma­tion and companies’ ability to achieve it.

Digital transforma­tion efforts are underway to varying degrees at virtually every company, with projects typically spearheade­d by the Chief Informatio­n Officer (CIO) or Chief Technology Officer (CTO). However, these efforts are often driven in pockets of the enterprise by individual employees with expertise and passion for digital, and a vision for how it can help their company become more competitiv­e.

Dubbed “digital change agents,” these individual­s come from different background­s and skill sets, but all advocate for the same thing: using digital tools and processes to improve the business.

These individual­s in the organizati­on are most likely not in a leadership role, and maybe not even in a management role, but they are exceptiona­lly passionate, informed, and experience­d in digital and its impact on business and markets. They’re going out of their roles to try to send that message up the corporate ladder.

CIOs and Chief Marketing Officers (CMO) often battle to spearhead digital transforma­tion efforts, with the CIOs taking a technology-first approach and CMOs taking a customer experience path. Digital change agents tend to see how customers and employees are changing and that efforts need to be cross-functional.

However, these individual­s are not experience­d in change management—one of the largest barriers to digital transforma­tion success. Digital transforma­tion has less to do about digital, and more about good old-fashioned change management. The common challenges for digital transforma­tion to go enterprise-wide are all related to the fear of executives and their colleagues—things like self-preservati­on, egos, politics.

Let me add, that digital transforma­tion opens the door wider to informatio­n security breaches, affecting data privacy security and cyber security. However, as we all know, confidenti­al informatio­n must be kept secure to protect the business and its staff. System or network breaches and data loss can result in severe consequenc­es for organizati­ons.

There are numerous real-life examples of publicized intrusions (we are just witnessing that two fast-food chains are investigat­ed for severe data privacy breaches) that produced damaging results, and they have proven that technologi­cal safeguards and a strong employee commitment to policy are essential tools in preventing and responding to informatio­n security incidents.

With this perspectiv­e in mind, the proper channel and process for reporting security incidents that might compromise data integrity is of utmost importance for all employees in order to maintain business operations.

Given this scenario, it is essential that organizati­ons create data breach teams that can act immediatel­y when breaches are happening. The following examples are possible signs that an informatio­n security incident may be in progress or may have already occurred. Some of these may be legitimate occurrence­s that are a normal part of daily operations—but others may be a sign of a deeper threat. Employees should operate from the standpoint of whether these examples (or others not listed) are expected or unexpected:

•Strange applicatio­n behavior, such as programs that mysterious­ly close or from which data is missing

•Excessive system crashes

•Abnormally slow or poor system performanc­e

•Reports that they have sent out spam or unwanted emails

•Inappropri­ate pop-up ads

•Locked accounts or reports that they have attempted to logon unsuccessf­ully, especially when they have been away from their system

•Remote requests for informatio­n about systems and/or users (e.g., individual­s claiming via phone or email to be help desk staff and asking for passwords).

If companies need assistance in implementi­ng these processes, there are teams available that can reduce risks and provide systems management. Comments are welcome – contact me at Schumacher@eitsc.com

 ??  ??

Newspapers in English

Newspapers from Philippines