Page 18 - Journal Layout-Dec 18_Neat
P. 18
PIPFA Journal IFAC Article
USB sticks? With the Cloud there’s so that are asking for an action or personal risk management framework.
much more security and much more information. • Hardware
process.” Drew Fenton agrees: “At the Here are factors to consider in order to Keep a log of hardware (including
end of the day if you are not in the keeping your data, and your clients, laptops and phones). Maintenance
Cloud you are not protected.” safe. contracts should be sustained with
So what are the risks of this so called Tips on Keeping Data Safe: hardware suppliers so that hard-
more secure digital data storage? They • Technology Risk Management ware failures can be quickly
boil down to the same old issue: keep- Framework rectified. Ban staff from using free
ing track of your data. IT security expert Wi-Fi -- on company or personal
Dr Michael Axelsen says, “Losing USB The first step firms should take is to hardware -- to access sensitive
sticks used to be the greatest risk, but build and maintain a technology risk data.
today the risk occurs when you go from management framework. This • Software
one Cloud provider to another.” Using includes policies and procedures on Keep an updated tracking system of
numerous Cloud providers may how a firm assesses and identifies current, past, and potentially future
increase your security risk. Why? risks associated with the use, software subscriptions. Regularly
Because cloud providers have the right ownership, operation, and adoption upgrade software to current levels
to edit and modify your inputted of IT.
information. Cloud providers don’t • The Cloud and allow time for system patching
agree on or maintain the same security Today’s cloud is safer than in-house before shutting down your devices.
agreements and – due to tough compe- servers, but data management is • Insurance
tition, potential cost issues, and key. Know who your providers are Adequate insurance for the firm
outsourcing overseas - your sensitive and where they are storing your must be maintained and cover the
data can potentially become compro- data. Consider security solutions cost of replacing infrastructure, and
mised. such as two-factor authentication. labor costs to rebuild systems and
“Practitioners need to make sure when • Disaster Recovery and Business restore data. Also, consider insur-
they change Cloud providers that their Continuity Plans ance for the loss of productivity
data is taken off the backup systems - It is too late to build a disaster recov- resulting from a major system
otherwise they could end up with a ery plan after an attack. Failure to failure or catastrophic event.
patchwork quilt of different service build and maintain an effective IFAC has recently launched an updated
providers” notes Axelsen, who argues business disaster recovery system the Guide to Practice Management for
that the Cloud is still far better than the can be catastrophic. Firms need a Small- and Medium-Sized Practices,
alternative. proactive risk management plan which includes a new chapter on Lever-
But what is the easiest way to get that covers system and software aging Technology and covers Develop-
hacked? It’s not the Cloud, Fenton back-ups; off-site storage; and trial ing a Technology Strategy, Hardware
says, the easiest way to get hacked is restores. and Software Options, Technology
by opening the wrong email. ‘Innocent • Cybersecurity Risks and New & Emerging Technolo-
emails’ asking you to click on attach- It is important to have system gies.
ments is an open door for hackers to utilities to protect the firm from Peter Docherty is the General Manager
access your system.” malicious attacks. Systems that can of Public Practice at CPA Australia,
Axelsen says firms can counter these proactively combat cybersec\rity responsible for strategic oversight of
events by initiating a “data respect attacks include, firewalls, virus issues impacting public practice mem-
culture” which involves making staff protection, malware/spyware bers globally, developing member
hyper-aware of data security. “That’s programs, and anti-spam and services and advocacy. Peter is a regu-
probably your best line of defense. Your phishing software. lar speaker in Australia and overseas
data might be encrypted and relatively • Policies and Procedures on regulatory oversight and practice
management. He facilitated the devel-
secure, but hackers can get something Installing good IT governance opment of the IFAC Guide to Practice
from your firm by social engineering procedures within a firm is critical. Management for Small to Medium
methods or phishing.” He recommends Policies should include guidelines Practices, CPA Australia’s Firm of the
having a strict risk policy and email that ensure that systems are not Future Report and Practice Manage-
protocols in place. Businesses are misused, with practices to ensure ment Portal.
increasingly testing their staff through that applicable policies are continu-
“phishing tests”, which are test emails ally reviewed and updated to reflect Copyright This article originally appeared on the
sent to staff emails asking them to click current risks. Ongoing education to IFAC Global Knowledge Gateway: www.if-
on a variety of requests. People need to all employees of the firm on technol- ac.org/Gateway. Visit the Gateway to find
change their mindset to constantly be ogy risks should be part of the firms additional content on a variety of topics related
on guard and suspicious of all emails to the accountancy profession
16 January-June, 2018