Business a.m.

Working out the weakest link in Informatio­n Governance

- PhD

THERE ARE MANY WAYS THAT AN IN FORMATION GOV ERNANCE system can collapse many ways, where even the finest of governance systems/tools can’t undo the damage. Consider this scenario: a disgruntle­d staff intentiona­lly downloads a lot of company informatio­n containing not only customer details, but also business secrets.

Another scenario is where one staff was caught with what has been termed CEO phishing email. This happens when a staff receives an email from there CEO about intended mergers or divestitur­es requesting the staff carries out a particular task to ensure that the merger or acquisitio­n deal goes on smoothly.

There is the adage that the “the chain is only as strong as its weakest link” and this truly reflects the way an organisati­on must approach their informatio­n governance. What are the necessary ways for company to figure out their weakest link and what are the steps that can be taken to ensure that the weakest link is immediatel­y treated?

The best form of weeding out the weakest link within a company would be by carrying out social engineerin­g table-top exercises. This means creating manipulati­ng action links within emails and try to find out who clicks the link and when someone does, or a group of people do then the company identifies these individual­s and try to put them into another training program.

Most stakeholde­rs think yearly training is enough for their staffs. But I would argue that that’s quite a low ratio when it comes to the importance of informatio­n governance training. Again, I must add that generic training—which is quite often the standard practice in most industries—just doesn’t carry weight when it comes to using training to inspire culture, boost the necessary companywid­e action points and protect the business interests as required. What companies need exactly in treating the weakest link within companies is what I call “targeted training”.

What is targeted training? Targeted training is the system of understudy­ing a particular department, for example, retail systems and looking in depth at the processes and business functions within that department and teasing out training in materials that would work for that department. If they handle tools or hardware facilities that delivers services to customers, then they must understand their positions about how their functions feed into the informatio­n governance methodolog­ies.

There is no one way for companies to find out the weakest link within their companies and there are no unique methodolog­ies for companies to employ when finding out the weakest link within their informatio­n governance structure. From a technical perspectiv­e, like I have mentioned in this space before, gap analysis plays a critical part in ensuring that some of these weaknesses can be highlighte­d.

It is good practise and as part of monitoring methodolog­ies, stakeholde­rs should always find out the best ways to find out the weaknesses that exists within systems and individual­s within companies that need targeted training or further informatio­n security training. These steps will further solidify company informatio­n security framework.

 ?? ?? MICHAEL IRENE,
MICHAEL IRENE,

Newspapers in English

Newspapers from Nigeria