......"Knowledge Based Global E-conomy"

  • Over 85% of organizations are detecting computer security breaches;
  • Response to Internet breach increases to over 55%, includes site attacks;
  • 38% of security breaches come from within the Firewall (compared to outside Firewall attacks);
  • Organizations are reporting financial losses due to breaches to a high of over 70% (companies reporting);
  • There is a larger amount of security within the Firewall to a higher than 75% reporting maintaining internal surveillance. Includes abuse of Internet privileges in the workplace;
  • While enterprise defensive software is becoming more effective, still over 80% of companies are detecting viruses. Effectively they are managing to isolate / quarantine detected computer viruses.

Information Source: Computer Security Institute
"Computer Crime and Security" survey

Attacks and intrusions mainly initiate from within the Firewall, however, external through the Internet are increasing, and is may get worst before it gets better, which relates to the cost impact of attacks is increasing. Others are coming into play such as:

  • Legal penalties which are resources and time consuming,
  • Aggravated lost revenues; and
  • Organization image.

Affecting also productivity adversely. Add-on that the market is reacting to these news  adversely thus affecting stock prices.

The best we can offer advice through this page is:

Include in securing your E-business, strategy and planning

Today's 24 / 7 world comprises on assumption that data and information integrity is maintained and that online access is available as needed. Ensuring access and connectivity is critical point-zero for on-line success (commercial or otherwise). When data is adversely affected and a net is attacked, the market reaction is to go somewhere else (customers today are complaining less, and just fading away). For reliability to prevail in a Knowledge Based Global E-conomy, the integrity of your Firewall (whether Internet, extranet or intranet) must dynamically being monitored, and which we call the secure environment.

    Securing business in this "e" era one must plan, do, monitor and review applying the herein guidelines:

    • Know the insides of your networking spectrum in tune with the organizations business policy and related objectives. categorize risk within the boundaries of your information resources (What if?), thus applying "Best Available Technology that is Economically Viable Alternative" (a "BATEVA" approach).
    • Define, evaluate, implement and maintain a feasible security policy. Applying a process approach "Nets" can best be secured concurrent with fundamentals for streamlining processes thus adding value which is to include system integration and the capability for ongoing access.
    • Improve, as technology evolves, process approach solutions such as Firewalls, verification, authentication and contemporary/dynamic that is scalable.
    • Consider purchasing compatible products and assessment tools from different sources and manufacturers. The one-stop shopping mall may not be the best herein alternative. Independent (from other products) vehicles for assessing status is likely to provide a more objective evaluation in security performance.
    • Some organizations have found viable to outsource its security management in either its entirety or partially. In this era of communicating, connecting and collaborating propitiate assisting through remote support. This holds more effective when you business is not related to technology dealing with telecommunications and Net platform - if your business is toys then it may be best to outsource experts for maintaining your portals for e-business or content.
    • Last but no least, "Get everyone on board" - yes, universal buy-in is a cliché, but it is still one of the first and most significant aspects. People need to understand their role in defining and what is to be protected and why. Management needs to understand the risks and protective measures, before placing financial information in the Internet.

It is common that organizations are implementing effective security policies. However, principles within ISO Kaizen-Blitz© can be helpful;

  • Market Trend
  • Discontinuance of technology
  • Evolution of Regulatory requirements

Considering that for many organizations their "forte" is not Network Security and thus maintenance can lead to ongoing difficulties affecting the business objectives. Securing your e-business with an outside source (from say BULLTEK network professionals) assist in measuring, controlling and thus securing business competitiveness while reducing risk. Through the support of our network of associate professionals, organizations can aggressively face scalable on-line challenges. 



Global Competitiveness and 
 Risk Reduction...Home Portal...