Page 5 - Business Insights Technology Industry
P. 5

5 KEY CONTROL ISSUES
 FACING TECHNOLOGY COMPANIES



             1: CYBER SECURITY               2: DATA COLLECTION
                                                   AND USAGE


        This has become  a major  focus for all   They  are now the lifeblood  of any
        companies, but it is even more of an issue   company. The more real-time and accurate
        for  technology-based  companies.  With   your data flow is, the better decisions your
        the ever-increasing  push to the cloud,   management  team  can  make.  Data  flows
        new capabilities  and sophistication of   like  a stream,  so you need  to understand
        software, the better funding of hackers   its  source,  how  it  is  flowing,  and  where
        (organized crime, nation states, insiders,   the  impediments  to  a  steady  flow  are.  In
        etc.), and the inability  for companies  to   evaluating your data collection and usage
        monitor and regulate the use of equipment   systems, you should consider:
        and  applications  by  their  staff  (e.g. cell
        phones),  it  is  getting  more  difficult  for   ► What data  you need  to  collect:  The
        companies to protect their data and the   collection and protection of data can be
        data  of their  customers.  A data  breach   pricey, so it is important to define what
        can  result  in  significant  losses  to  a   source  data  is  going  to  have  the  most
        company’s reputation and its bottom line.   meaningful  impact on your business
        It  is  critical  that technology  companies   operations.  Things  like  inventory  flow,
        stay abreast of new emerging threats and   product  sales, customer feedback, etc.
                                            are all potentially important factors  to
        protection  criteria on the market  to avoid
 T  oday’s businesses operate  at  the  speed  of data. A company’s ability to access   costly losses. In developing  proper cyber   capture information on.
 information; reach people; open markets accessible through phones and tablets; and
 push data throughout its operations, is essential to effectively operate its business.   controls,  companies  need  to  consider
 Systems that track inventory on a real-time basis provide instant customer relationship   both  high-tech  and  low-tech  intrusions   ► Where this data is coming from: You
 information,  aid  in  search  engine  optimization,  and  process  payments  efficiently  and   and develop systems and controls to   need to identify  what the source of the
 effectively are worth their weight in Bitcoins. Technology-based companies are often on   protect  against these. Limiting  access to   needed data is, who has access to it, how
 the leading edge of data movement and storage, which bring up key control issues that are   sites  (e.g. Facebook),  training  staff  about   is it being accumulated, how accurate is
 not necessarily unique to technology-based companies, but should weigh heavily in their   phishing scams and other cyber threats,   it, and how timely is it.
 assessments of risk and design of internal controls.  performing  regular intrusion  detection
        protocols and running data loss prevention   ► How the data is being collected: Do
        software, implementing  and updating   you have protocols in place  to ensure
        firewall  securities  regularly,  performing   you are collecting the appropriate data?
        staff  background  checks,  controlling   Who is entering the data into the system
        access management,  and ensuring proper   or is the data being automatically pulled
        encryption and transference of sensitive   from a source? How do you ensure
        data are some of the many security issues   proper  notification  if  data  entry  fields
        that need to be reviewed and assessed on   change? Is the data appropriately stored
        a regular basis. You need to consider these   to prevent  inappropriate  access?  And
        and other factors when developing your   are confidentiality standards in place to
        company’s IT policies, which should also   ensure security of data?
        include  regular  reviews  of your  systems
        and your security incident  response and
        communication plans.






 3                                                                          4
   1   2   3   4   5   6   7   8   9   10