Information Security Insights From and For Canadian Small to Medium Sized Enterprises

Similar documents
Effective IT Risk Management for Small Businesses

Internet threats: steps to security for your small business

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Office of Inspector General

Cyber Security. John Leek Chief Strategist

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Microsoft s cybersecurity commitment

Time Is Not On Our Side!

April 28, Dear Mr. Chairman:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

SIZE DOESN T MATTER IN CYBERSECURITY

Better secure IT equipment and systems

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cyber Risks in the Boardroom

Security Basics: A Whitepaper

2012 NCSA / Symantec. National Small Business Study

How to Practice Safely in an era of Cybercrime and Privacy Fears

NATIONAL CYBER SECURITY AWARENESS MONTH

Dealer Member Cyber-security

I ve been breached! Now what?

Big Data, Big Risk, Big Rewards. Hussein Syed

10 Smart Ideas for. Keeping Data Safe. From Hackers

THE WHITE HOUSE Office of the Press Secretary

SPEAR PHISHING UNDERSTANDING THE THREAT

Don t Fall Victim to Cybercrime:

The Cloud App Visibility Blindspot

Cisco Advanced Services for Network Security

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

What is Management Responsible For?

Data Security Incident Response Plan. [Insert Organization Name]

I N T E L L I G E N C E A S S E S S M E N T

Connect Smart for Business SME TOOLKIT

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cybersecurity y Managing g the Risks

Global IT Security Risks

A multi-layered approach to payment card security.

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Cybercrime and Regulatory Priorities for Cybersecurity

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

UF IT Risk Assessment Standard

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

2011 NATIONAL SMALL BUSINESS STUDY

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Information Security Incident Management Guidelines

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cybersecurity Enhancement Account. FY 2017 President s Budget

Considerations for Outsourcing Records Storage to the Cloud

Lessons from Defending Cyberspace

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

AUDIT TAX SYSTEMS ADVISORY

Protecting Your Organisation from Targeted Cyber Intrusion

White Paper. Information Security -- Network Assessment

Feedback Ferret. Security Incident Response Plan

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Cyber Insurance Presentation

Cyber Risks and Insurance Solutions Malaysia, November 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cybersecurity Risks, Regulation, Remorse, and Ruin

Cyber Risk Management

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

HIPAA Compliance with LT Auditor+

Brief. The BakerHostetler Data Security Incident Response Report 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

OCIE CYBERSECURITY INITIATIVE

Cyber Essentials Scheme

How To Defend Yourself Against Cyber Attacks

What Data? I m A Trucking Company!

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Cyber Security Strategy

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Datto Compliance 101 1

Cybersecurity: Protecting Your Business. March 11, 2015

Data Management Policies. Sage ERP Online

ISO Controls and Objectives

AN INFORMATION GOVERNANCE BEST

Guideline on Auditing and Log Management

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

The Attacker s Target: The Small Business

ITAR Compliance Best Practices Guide

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybercrime: risks, penalties and prevention

Privacy Breach Protocol

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Security and Privacy

White Paper on Financial Industry Regulatory Climate

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Cyberprivacy and Cybersecurity for Health Data

Breaking the Cyber Attack Lifecycle

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Employing Disinformation Security to Protect Corporate Networks with NetBait. A NetBait Whitepaper June 2003

A HELPING HAND TO PROTECT YOUR REPUTATION

Standard: Information Security Incident Management

Network Security & Privacy Landscape

Cyber Essentials KAMI VANIEA 2

Transcription:

Information Security Insights From and For Canadian Small to Medium Sized Enterprises Paying Attention to Information Security CPA Canada recently completed an online study conducted by Nielsen called Information Security for Small and Medium Enterprises. With a focus on SME practices, it surveyed basic aspects of the IT security of 398 accounting professionals (the margin of error is +/- 4.9%, 19 times out of 20), providing revealing insights into the state of data protection across a diversity of sectors. The study results are summarized and augmented with suggested questions and resources in CPA Canada s publication Defence Mechanisms: How Canadian SMEs Are Dealing With Information Security. In comparing the practices and priorities of Canadian accounting firms with those of non-accounting firms we found that most firms share similar concerns about IT security and the associated risk of data breaches. How Canadian Businesses See Security Peering into the IT security practices of Canadian companies has traditionally been challenging due to limited legislative guidance and the natural tendency of small and medium-sized organizations to control their own information. This year, CPA Canada tackled the challenge by commissioning Nielsen to complete an important study entitled Information Security for Small and Medium Enterprises. Based on interviews with CPA Canada members, the results yield rich new insights into the way Canadian businesses like yours manage risk, implement security and adopt new technologies. So what do we know about how you deal with information risk? 1

2 Information Security Insights From and For Canadian Small to Medium Sized Enterprises You care about information security CPA Canada members in small and medium enterprises don t just want to protect assets for the sake of security. They are genuinely concerned about safeguarding information owners and their data in the face of evolving cybersecurity threats. You have adopted good security practices Many Canadian companies have basic practices such as backing up data and using strong passwords. Although they are by no means sufficient for ensuring cybersecurity, many IT security practices focus on prevention. Information Security Synonymous with data security, it is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g., electronic, physical). You recognize security problems More than four out of 10 respondents know that they have experienced a security breach, which indicates a high level of awareness of information security risks. Detection of security breaches either by proactive or reactive means is a key step towards awareness and the adoption of proper practices. Cybersecurity Cybersecurity, often used interchangeably with computer security and IT security, is a broad term that describes protection from and defense against attacks from cyberspace. What Security Concerns Do SMEs Have? Cybercrime tops the list of concerns that respondents have: 72% are concerned about having their business data hacked and stolen, which is not surprising given the malicious data breaches in recent news headlines. Roughly two-thirds (66%) are concerned about having intentional errors or corruptions of their business data and systems, while 61% are concerned about having their website or other systems crash and 50% are concerned about having their website or other systems attacked. Are their concerns justified? Almost half (43%) of businesses reported security incidents, and more than 80% of these firms reported that at least moderate resources (cost and effort) were required to recover from the damage, which included: 1. loss of computer usability or availability 2. corrupted database information

How Are Canadian Firms Managing Security Risks? Surprisingly, confidence is one of the key metrics determining the preparedness of Canadian companies to address security concerns. The vast majority of Canadian respondents (81%) indicate they have confidence in the IT security of their organization, even when these practices are very basic and provide inadequate protection. What does the confidence of Canadian SMEs have to do with the effectiveness of their cybersecurity? Results indicate that those confident in their approaches are also more likely to: 1. have more IT security safeguards in place 2. check their IT security safeguards more often 3. have a dedicated person responsible for information security But confidence alone will not protect you and your business. The top IT security measures followed by Canadian organizations reveal some basic best practices. CPA Canada recommends that all members adopt these security practices: 1. the use of strong passwords 2. off-site data backups 3. off-site system backups 4. regular password changes Information Security Insights From and For Canadian Small to Medium Sized Enterprises 3

4 Information Security Insights From and For Canadian Small to Medium Sized Enterprises Asking the Right Questions About Security Makes Good Business Sense Our research indicates that just over six-in-ten (61%) of small and medium enterprises use external IT resources. Knowing what to ask of your IT and security providers will not only save you time and money, but it can also save your business. Here are the top five questions that are deemed most relevant to the majority of Canadian firms: 1. We run a very lean operation with limited resources. Can we protect our data in-house without breaking the bank? There are relatively easy and inexpensive measures that you can take in-house to protect your data that are a good start. Below are measures that over four-out-of-five SME respondents reported that their organizations are taking to help protect their data. Does Someone in Your Organization? Backup systems and data regularly Backup important data on your computers on a regular basis Make sure software is up-to-date Check that the system and data back ups are working properly 96% 94% 93% 87% In addition, over six-in-ten respondents reported that their organizations review user account privileges periodically (62%) and review user accounts periodically (61%).

2. We are small, nimble and innovative. What should we know about technologies such as the cloud, social media and mobile commerce? You are not alone. Between 12% and 39% of Canadian businesses currently use such innovative solutions. Exploit new technologies for your business but be sure to ask your trusted IT and security pros about ways to secure these emerging technologies. 3. We only found out about our last security incident because something stopped working. How can we detect a hacking attack or data theft? Your network should be properly designed and environment segmented to support data storage according to sensitivity. That is, your network should have one gateway (connection) to the internet and this should be a firewall. Most SME level firewalls today can also filter out bad internet traffic and provide Virtual Private Network (VPN) service to allow your employees to access the LAN and internal systems securely. If you have very sensitive data inside your LAN, you can also cordon off a part of the LAN, much like a restricted office space using another firewall. Don t panic! Understand the concept, and ask IT or information security professionals for help with all of this. Depending on your business practices, industry sector and cybersecurity measures, your adviser may describe potential hacking scenarios and suggest ways to recognize when a security incident has occurred. An authoritative resource to consult is the Canadian Privacy and Data Security Toolkit, a CPA Canada publication designed specifically to address the needs of small and medium-sized businesses. It discusses intrusion detection and prevention and suggests that to maximize your chances of discovering a breach, you must rely on people, processes and technology: your people should be trained to recognize and report security problems your processes must be able to detect suspicious activity your technology should monitor systems for evidence of incidents Information Security Insights From and For Canadian Small to Medium Sized Enterprises 5

6 Information Security Insights From and For Canadian Small to Medium Sized Enterprises 4. If we discover a breach, what should we do? Much depends on the type and circumstances of your security or privacy incident. The type of access control (passwords or multifactor authentication) will also play a part. If it s possible that personal information has been compromised, you may be advised to leave the crime area untouched to facilitate a forensic investigation. You can contact the Office of the Information and Privacy Commissioner of Ontario or the Office of the Federal Privacy Commissioner to make a report and ask for more guidance. You can also contact the Canadian Anti-Fraud Centre to report Internet-borne cybercriminal activity and other types of computer-based mischief. 5. What are some other sources of information about security and privacy for SMEs? Your adviser may suggest information sources specific to your sector, business focus and preferred degree of technical detail. You should also consider the following resources: The Canadian Privacy and Data Security Toolkit (CAStore.ca) Securing Personal Information: Self-Assessment Tool (Priv.GC.CA) Information Systems Security Compliance (search on CPACanada.ca) IT Security Practices (search on CPACanada.ca) Cyber-security Opportunities for Smaller Accounting Firms (contains a glossary of security terms used in this publication and additional references; search on CPACanada.ca) Author: Claudiu Popa DISCLAIMER This publication was prepared by the Chartered Professional Accountants of Canada (CPA Canada) as non-authoritative guidance. CPA Canada and the authors do not accept any responsibility or liability that might occur directly or indirectly as a consequence of the use, application or reliance on this material.