Risk Controls



A sustainable information risk management system is vital to any business’ survival in battling off the growing number of potential threats associated with the dynamically changing IT environment (Saluja & Idris, 2015). It is important for all companies to implement a framework such as COBIT 5 or the ISO 31000* standard in order to effectively respond to risk scenarios. A system like such would have been useful to a former workplace of mine where a manager left his unlocked phone in the back of an UBER. His phone was stolen, and the perpetrator was able to access the companies own Facebook account. Without a password on his phone, the perpetrators were able to tarnish the business’ reputation and caused a lot of negative publicity.

Cobit 5 highlights the firm’s processes, such as controls around strong passwords, as an enabler to achieve a sustainable risk appetite and overall end-to-end approach. It would be necessary for companies to implement a system which will safeguard themselves against physical loss of data, unauthorised individuals accessing private information and from the ugly wrath of cyber hackers (Mentzer & Manuj, 2008). Therefore, businesses should view managing said risks as a fundamental element to sustaining effective daily operations.



* ISO 30000 Standard



Report finds Australia to be lucrative market for cyber criminals: http://www.abc.net.au/news/2016-02-26/cyber-criminals-increasingly-targeting-australia/7203478 






References

Mentzer, J. T. & Manuj, I., 2008. Global Supply Chain Risk Management. Journal of Business Logistics, Volume 29.
Saluja, U. & Idris, D. N., 2015. Statistics bases on Information Security Risk Management Methodology. International Journal of Computer Science and Network Security, 15(10).


Comments

Popular posts from this blog

The Fraud Triangle lives on

The Quantification of Damages role

Out with the old. In with the new!