• Send Us A Tip
  • Calling all Tech Writers
  • Advertise
Tuesday, July 15, 2025
  • Login
TechStory
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
TechStory
No Result
View All Result
Home Tech

Information Security – A Capability Overlooked or a Feature Assumed?

by Guest
March 29, 2018 - Updated On March 7, 2021
in Tech
Reading Time: 4 mins read
0
Information Security – A Capability Overlooked or a Feature Assumed?
TwitterWhatsappLinkedin

information security capability overlooked or feature assumed

You might also like

Nintendo Switch Piracy Hub Nsw2u Taken Down in FBI Crackdown

France Investigates X Over Algorithm Changes Amid Fears of Foreign Interference

Tesla Slashes Model Y Price by $20,000 in Canada as Tariffs and Sales Woes Mount

In this technologically advanced era where business models aim at delivering superior customer experience; essentially no functional domain remains untouched by various emerging technologies. Disrupting many business models, IT investment is more of a strategic or turnaround decision and it becomes imperative for firms to integrate IT with their existing models.

We are heading towards a future driven by technology, in smart cities, where processes would be intelligently and remotely controlled with minimum human intervention. Organisations need to ensure that they do not become obsolete with changing trends and strive for better results.

Although so much has been said about the enormous advantages of relevant information that can be harnessed through data available from IT systems, about various algorithms that can be used to analyse this information to drive profitability and about integration of all functional domains into IT systems, yet little emphasis has been laid on developing Information Security Systems as a core capability.

A KPMG study “Supply Chain Management for the Future” suggested Australian consumer goods organisations to transform their supply chain management in order to exceed customer expectations. The solution entailed a collaborative supply chain management system, integrated with financial information and modernised by driverless trucks, drones, IOT and cloud based technology.

Another study by Mckinsey “The Next-generation Operating Model for the Digital World”, briefs about a next generation operating model that firms may adopt to enhance their productivity/efficiency. This model combines digital technologies and operations capabilities in an integrated manner to achieve improvements in customer experience, revenue, and cost.

Both these studies describe at length the technological advancements and integrated models that span across all the domains of business(sales, finance, operations  etc) yet none of them lays emphasis on information security which encompasses both digital and cyber security.

Generally companies protect their systems using access management tools, firewalls and encryption softwares. But with so much integration expected in future, the pertinent question is whether the existing tools, mechanisms and standards would be sufficient to ensure information security? In any network, any weakling can be exploited to inject potentially malicious programs.

The proposed tool may have several layers of protection but there is a fair chance that the application of the tool may not be attacked directly at all. In interconnected systems there is possibility that the malign program is injected at some distant node- a vulnerable site, a remote client location and the program is intelligent enough to fine tune its behaviour like that at client’s end.

In an ecosystem where the systems are expected to take leaps, status quo cannot be expected in the way hackers target vulnerabilities. Hence the technologies would strengthen their malign intents as well.

Most of the tools present today work on access management which is conceptualised on authentication and authorisation of users (workforce) accessing information on the basis of a set of rules.

In an interview for MIT Sloan Management Review, cyber security expert Stuart E. Madnick stated that usually 50% to 60% of the cyber attacks occur by “Spear phishing” unintentionally aided by the workforce employed (clearly access management tools cannot be vital here). In future, access management would not be sufficient to protect the systems.

He further suggested that any data security system should essentially be capable of preventing any attack, detecting any malicious activity and recovering data and system after an attack. Majority of tools currently available do only prevention (that too not very effective) , detection and recovery are far out of sight.

In 2015, Ukraine’s electric grid was hijacked.  In 2017, Uber concealed a hack that affected 57 million customers and drivers. In 2017, Russians hackers infiltrated US power grid. Today when all the business models are transforming to digital are companies amply equipped to prevent, detect and recover from such menaces?

There is also a dire need to question the relevance of various metrics that are used today. Will they be sufficient to gauge a firm’s performance in a future where growth of technology would know no bounds? Will not “perceived information security” be one of the core values that any customer would expect? Would not customer satisfaction, brand equity, customer loyalty and customer equity be impacted by this proposition? Will not security be a hygiene factor to delivering customer satisfaction?

Clearly, either the relevance of information security has been undermined or it has been assumed that with passage of time companies would equip themselves to foster better information security.

In any case, information security should not be compromised with and companies should develop capabilities around it to gain competitive advantage.

Also Read: Top 5 Security Strategies For Home-Based Entrepreneurs From IoT Cyber Threats

(Disclaimer: This is a guest post submitted on Techstory by Swati Agarwal, pursuing the one year MBA at Great Lakes Institute of Management. All the contents and images in the article have been provided to Techstory by the authors of the article. Techstory is not responsible or liable for any content in this article.

Image Source: fintechtime.com

Tags: cloud computingCustomer Supportcyber securityDigital SecurityInformation SecurityInternet of Things
Tweet54SendShare15
Previous Post

Amazon Prime Music signs three content deals to boost multi-lingual entertainment

Next Post

Fashion startup Fynd raises Series C funding from Google,others

Guest

Recommended For You

Nintendo Switch Piracy Hub Nsw2u Taken Down in FBI Crackdown

by Harikrishnan A
July 15, 2025
0
Nintendo Switch Piracy Hub Nsw2u Taken Down in FBI Crackdown

A well-known website catering to Nintendo Switch piracy, Nsw2u, has been permanently taken offline following an investigation led by the FBI. The site, widely used for downloading illegal...

Read more

France Investigates X Over Algorithm Changes Amid Fears of Foreign Interference

by Harikrishnan A
July 15, 2025
0
European Union Commences Investigation into Social Media Firm X for Alleged DSA Violations

French authorities have opened a formal investigation into the social media platform X—formerly known as Twitter—amid allegations that its algorithm may have been manipulated to support foreign interference...

Read more

Tesla Slashes Model Y Price by $20,000 in Canada as Tariffs and Sales Woes Mount

by Harikrishnan A
July 15, 2025
0
Tesla Owner Burns Down Car and House After Plugging Directly Into Power Line

Tesla is in crisis management mode in Canada, cutting the price of its Model Y SUV by a staggering CAD $20,000 in an urgent attempt to recover from...

Read more
Next Post
Fynd

Fashion startup Fynd raises Series C funding from Google,others

Please login to join discussion

Techstory

Tech and Business News from around the world. Follow along for latest in the world of Tech, AI, Crypto, EVs, Business Personalities and more.
reach us at [email protected]

Advertise With Us

Reach out at - [email protected]

BROWSE BY TAG

#Crypto #howto 2024 acquisition AI amazon Apple Artificial Intelligence bitcoin Business China cryptocurrency e-commerce electric vehicles Elon Musk Ethereum facebook funding Gaming Google India Instagram Investment ios iPhone IPO Market Markets Meta Microsoft News NFT samsung Social Media SpaceX startup startups tech technology Tesla TikTok trend trending twitter US

© 2024 Techstory.in

No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to

© 2024 Techstory.in

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?