Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 9 December 2010

ISACA leader warns companies to prepare for a Frantic Friday of employee online shopping

Posted on 11:18 by Unknown

London, UK  (9th December 2010)—The big freeze that hit the UK at the start of December is likely to be felt in more ways than one, says a business IT leader with ISACA, the not-for-profit IT security association.

According to Peter Wood, member of ISACA Security Advisory Group and CEO of First Base Technologies whose experience with IT security spans back to the very earliest days of the Internet, the big freeze means that this year's online shopping surge is likely to be pushed back from previous years.

"All the signs are that this coming Friday - the 10th of December - is likely to be among the busiest days for pre-Christmas online shopping, and the bad news is that, as it's a working day, business productivity could take a severe hit," he said.

"But perhaps more important, ISACA's research suggests that, in the rush to get all the Christmas present shopping done online, many employees will be opening up their employers to online security attacks, as their normally high guards will be lowered," he added.

Wood points to the fact that IBM's Coremetrics operation reported a 94 per cent increase in the value of goods purchased online in last year's pre-Christmas run-up, as well as the fact that the average number of presents bought online had increased from 2.7 to 3.7 presents per person in 2009 (http://bit.ly/dTIL0I).

If these figures are extrapolated to this year's online Christmas, it becomes clear that, coupled with the big freeze, consumers' retail shopping is certain to be curtailed in favour of the bargains to be found online, he went on to say.

Wood, whose company specialises in penetration testing, adds that further analysis of last year's pre-Christmas online shopping trends showed that the busiest day tended to be towards the end of week.

Factoring in the data from Experian Hitwise’s analysis of last year’s Christmas  (http://bit.ly/hGDPQC), it's fairly obvious that, coupled with the big freeze,  the 10th of December will be a Frantic Friday as far as online retailing goes, he explained.

As ISACA's own research has shown, he says, organisations need to be aware that the enthusiasm of their employees to do their holiday shopping online means that their normal security procedures may be compromised.

According to the association, which has more than 95,000 constituents around the world, its recent `Shopping on the Job' survey - which took in responses from 360-plus workers in the UK and 630-plus staff in the US,  57 per cent of employers do not prohibit the use of work email addresses for online shopping by staff.

As well as increasing the risk of malware infections, Wood says that ISACA researcher s also found that managers underestimated the productivity losses due to all their staff's online shopping.

ISACA'a 2010 Shopping on the Job survey also  found that 18 per cent of those surveyed said that they thought the financial cost per employee due to productivity losses were between £500 and £3000, whilst a further 9 per cent said that the losses were between £3000 and £6,000 per member of staff.

And, says Wood, a further 5 per cent said they believed losses were between £6,000 and £10,000 and per person.

The survey, says the ISACA security professional, shows the real risks that organisations are taking for failing to differentiate between employees’ working activities and obvious leisure activities in the workplace.

No one likes to be accused of being a scrooge by banning a little fun in the workplace, especially at this time of year, but the lack of security policies - and their enforcement - that is highlighted by this analysis is very worrying, he said.

It's against this backdrop that I advise employers to seriously consider the use of separate computers - isolated from the corporate IT systems where appropriate - for online shopping in the workplace during breaks and mealtimes, and for the issue of Web email addresses such as Gmail and Hotmail, exclusively for employee's leisure time usage, he added.

"Using this approach makes sound business and security sense, since it isolates the problem. Employers should also use IT security systems to enforce the rules, and so defend their company IT resources from a potentially devastating infection," he said.

"As our annual ISACA online shopping report clearly shows,  allowing staff relatively unfettered access to the Internet for shopping purposes in the workplace can be  dangerous. There is no point in employers taking unnecessary risks with their IT assets," he added.

For more on the topic of managing risky online behaviour in the workplace, download ISACA's  new free white paper, E-Commerce and Consumer Retailing: Risks and Benefits, at http://www.isaca.org/online-shopping-risks.

With 95,000 constituents in 160 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA® Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) designations. ISACA continually updates COBIT®, which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.

Follow ISACA on Twitter: http://twitter.com/ISACANews

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ▼  2010 (192)
    • ▼  December (20)
      • Beware of Malicious Twitter trends
      • PRIVILEGE GUARD NAMED "BEST SECURITY PRODUCT 2010"
      • Infosecurity Europe organisers say lack of awarene...
      • CitySights card hack could generate PCI DSS fallout
      • Working to Prevent Being the Next WikiLeak? Don’t ...
      • As 4m Brits travel this Christmas, thousands of Mo...
      • Imperva research: Insiders are most often responsi...
      • Report shows UK Government and IT security experts...
      • After this years’ security Tsunami – tips on how t...
      • ISACA leader warns companies to prepare for a Fran...
      • Organisations warned to review security as WikiLea...
      • Just in Time for the Holidays – Zeus Targets Major...
      • Bank of Cyprus UK secures its customers with Trust...
      • Imperva Unveils Comprehensive Strategy to Enhance ...
      • New ISACA Guide Shares Strategies for Minimizing V...
      • 460 Chinese Hackers show why IT security is so cri...
      • Seeweb selects Scality to provide faster public cl...
      • The Golden Hour of Phishing Attacks
      • NHS Choices response to Facebook security issue is...
      • USB Consumerism Out Of Control as 21% use 10 or more
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile