August 6, 2015 – Cyber security, a popular term due to several statements and Executive Orders from the White House related to Homeland Security issues, is closely related to Information Security. The latter aims to protect items of value (information: personal, corporate and governmental), while the former aims to protect the devices (computers and smartphones) and networks (Internet) which store and transmit the information.
Common axioms in information security are “everyone has a role to play,” and “a system is only as secure as its weakest link.” But just like a sports team which has a common goal (winning) but whose members have specific positions to play (offense, defense, special teams), so too are there very specific things that individuals at various levels and roles in an organization can and should do to effectively secure systems and information.
Members of the board, senior management, middle management, the I.T. (information technology) department, the HR department, customers, vendors, rank-and-file employees, and private citizens all have individual roles to play in cyber/information/IT security, and each should know and play his or her role effectively, lest they become the weakest link.
Comfortable with yours? Register for Business First’s Cyber Security Power Breakfast on Tuesday, August 11. I will be on a panel with experts from the FBI, Hodgson Russ and Lawley Insurance.
About the Author
William Prohn CISSP, CISA, CGEIT, CRISC, CMMC-AB RP
Bill oversees all aspects of information technology for the firm, and provides consulting services to a wide spectrum of Dopkins’ clients. He has over 30 years of experience in accounting and business information systems. His specific interests include creating meaningful, practical management information using computer technologies, and the security of business information and systems.