In an e-commerce environment where the only constant is unrelenting change,
there are two things one can rely on.
The first is that there will be hackers out there that are one step ahead of you.
The second is that the lawmakers will be one step behind.
In an e-commerce environment where the only constant is unrelenting change,
there are two things one can rely on.
The first is that there will be hackers out there that are one step ahead of you.
The second is that the lawmakers will be one step behind.
Both of these realities imply that no one can rely completely on defensive technology
or the law to protect their interests.
This places a significant burden on those who use network technology to constantly assess the
risk exposures from all sources, and take all necessary prudent and economic action to manage them.
This process involves five basic steps:
-
Periodically revalue all network-exposed digital assets at risk, both tangible and intangible
-
Promote awareness as to the latest developments in the world of cyber threats and defensive tactics
-
Make sure investments in security remain commensurate with the assets at risk
-
Constantly reinforce strong cultural awareness of digital liability management throughout the organization
-
Maintain access to the technical and legal expertise needed to manage risk and respond to threats at all times
By proactively managing digital liability, one can thrive in a global economy that will become ever
more reliant on network-enabled transactions to improve speed, conquer distance,
and remove the inconsistency of human intervention.
There is, however, an old saying that goes:
"Computers allow you to make more mistakes faster."
We would propose an updated version that networked computers allow you to make more mistakes globally.
|
Electronic commerce exposes an organization, regardless of size or location,
to an entire world of technology-enabled enemies and thieves
who would threaten the integrity of a business for glory or profit.
It also makes victims subject to the laws
and litigators of countless states, countries, and municipalities where they have never had a physical presence.
It is a certainty that the statutes will be as outdated as the case law is inconsistent and opaque.
With the enhanced threats, however,
comes enhanced opportunity for those who do the best job of employing an enlightened
and comprehensive information security program.
These individuals and firms will be in a superior position to their peers
and competitors to take maximum advantage of the connected global economy
while keeping their risks at an acceptable, and manageable level no matter what the future brings.
|
With the enhanced threats, however,
comes enhanced opportunity
-- for those who do the best job of employing an enlightened
and comprehensive information security program.
|
|