Security And Privacy Issues Faced By Businesses And Its Impacts

Security issues faced by business organization and measures adopted to tackle those

In the current era, almost each and every business firm uses digital standards to maintain company data, MIS records and customer as well as service records. In such type of digital maintenance standards, security vulnerabilities are natural, as any information that goes online poses a risk regarding theft or manipulation. Vulnerabilities can be of two types, with risk and without risks. Potential company information that may affect company value can be considered as vulnerability with risk, while information that does not affect any company operation, are vulnerabilities without risks. Privacy policies for a business organization has been considered for this study to discuss about issues as well as existing Australian privacy policies for those issues. Finally recommendations have been provided and conclusion has been drawn out from the same.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Security issues faced by business organization and measures adopted to tackle those 

With emerging trend of digitalized world, issues regarding security breach and leakage of information have also increased. From 2015 to present number of cyber security incidents have increased considerably. Rate of phishing increased to about 31%, ransomware to 15%, unauthorized disclosure of information to 36% and denial of service to about 4% (Allen & Peloza, 2015, p. 640).

Several companies have been victims of theft of information and customers have been part of denial of service and unauthorized disclosure.

In 2016, several social media platforms and online service providers faced security breach issues. For example, in 2016, many yahoo accounts got hacked which led Yahoo owners to warn users for theft of information. Concerned people of Yahoo came to know about such phishing incidents when several people reported about email spam and hack of bank accounts. On December 2016, Yahoo updated and enforced security guidelines for strict maintenance of customers’ account (news.com.au, 2017).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

On March 2016, Snapchat experienced biggest security breach and ethical dilemma ever. Ethical dilemma came into limelight when an internal employee admitted to have disclosed unauthorized information to an outsider. Information regarding valuable data was leaked which led to hacking of customer accounts that in turn led to exposure of several video as well as image files online. Almost 121 million accounts were hacked worldwide and almost 100,000 video as well as image file was exposed online (nbcnews.com, 2017).

As a result of this incident, Snapchat CEO Evan Spiegel posted an apology on social media websites and informed about a bug that led to this massive breach of data security. This company went into legal troubles and went on to install strict security protocols like secure socket layer, transport layer security, secure HTTP and secure Email (Almorsy et al. 2016, p. 5).

Privacy policies needed to operate a safe business

Pretty Good Privacy (PHP) privacy standard, a public-key cryptosystem is a popular protocol nowadays for business ventures which delve into digital practices mostly (Altuhhov et al. 2013, p.110). This system helps to indicate authenticity of digital signature, codes and user accounts which helps to prevent malwares in a system.

Security breaches are not only observed in digital platforms but also in physical ones. For example in 2016, Woolworth faced massive privacy threats when it found out the existence of whistle blowers within the company. Before Anzac day, their internal plans for Anzac day offers got leaked and this led to the failure of the entire plan (news.com.au, 2017).

Privacy policies needed to operate a safe business

As stated in the Australian Privacy Principles (APP), there are 13 basic principles that a business can include in their policies. Most of the Australian public as well as private organizations that have an annual income of more than $3000,000 are considered collectively as APP entities which must abide by the regulations of Privacy Act 1988 (Andress & Winterfeld, 2013, p.50).

Some of the basic principles have been stated by Australian Privacy principle (2017);

Principle 1:

A business must familiarize itself with privacy policies as well as people associated with privacy norms.

Principle 2:

A business must consider the design of privacy before setting up a business

Principle 3:

A business need to maintain integrity of data collected from common people and deal with them in an open transparent manner

Principle 4:

If there is an involvement of platforms which may expose customer information, then these platforms must provide an option of anonymity to the customers

Principle 5:

An APP covered entity must collect information from people that are necessary for a business.

A business venture must let people know about certain aspects of information that are being collected from customers or common people.

Principle 6:

Companies must keep their privacy policies updated and also must let people know about information that needs to be shared with third party members (Australian Privacy principle, 2017).

Principle 7:

Security principles must be imposed on company assets as well as working procedures, especially security maintenance procedures that may help to cope up with security issues. Users’ privacy must be kept intact with the help of government principles

Theoretical frameworks for security management 

Most of the frameworks on security management have been drafted by the guidance from APP principles, which is based on a common concept of imposing securities regarding availability of information and maintenance of data.

Theoretical frameworks for security management

Information security TRIAD

This TRIAD model is based on three basic aspects namely Availability, Integrity and confidentiality of information. Confidentiality is the process in which restricts free access of information, while integrity is the assurance that all information are trustworthy. Availability is the process which ensures accessibility of information by authorized people (Baskerville et al. 2014, p. 148).

Business ventures need to comply with these procedures for maintaining proper security management.

Layered onion security model

Layered onion model or Defense in Depth (DiD) is a security assurance procedure, which involve multiple security controls as well as Information Technology (IT) systems.

Outer layers generally contain firewalls, middle layers contain security controls and in centre remains the data that needs to be protected (Biener et al. 2015, p. 152).

Business dealings that involve digital platforms generally make use of this onion model to mitigate risks regarding the breach of data. The steps typically include involvement of physical security, network security, prevention of unauthorised access, guard information, detect malware or bugs and mitigate risk by appropriate protocols.

Analysis

Breach of security involves potential risks as leak of confidential as well as customer data not only affect reputation of companies but also affect the relationship between a company and its potential stakeholders.

Impact of security breach on business values

In the recent years, due to increasing risks regarding security breach, impact has been detected in six different categories. Reputation and brand damage accounts to 29%, loss of productivity up to 21%, revenue losses up to 19%, forensics up to 12%, technical support of about 10% and compliance regulatory measures 8% (Chang et al. 2014, p. 40).

According to Corones & Davis (2017, p. 70), social media platforms lose millions of users within a day due to security breaches. For example Snapchat lost 12 million users when its security breach scandal came into limelight in 2016. Yahoo was found to lose its pace back in 2016 due to mass account hacking scandal. Woolworth failed to collect enough revenue on Anzac day, rather Coles; a potential competitor of Woolworths emerged as a superior retail chain (news.com.au, 2017).

Over the past 12 years, rate of security breaches has increased mainly due to involvement of innovative technological methods. Some other relevant reasons that have been found in cases associated with security breaches are stated by Seo & Kim (2015, p. 1580):

Technical failure

Failure of technologies is inevitable as minor bugs in the system can hamper an entire system. Majority of companies imply complex technologies but does not stay aware of software involved in the system.

Analysis

No perimeter for protection

As per the guidelines of APP, a company needs to design its security standards before involving any kind of operations, which most of the companies fail to apply (Wu et al. 2014, p. 6).

Lack of layered defense

Onion model suggests the use of security at each level of storing or processing information which is helpful to safeguard valuable information from the attack of potential hackers. Mostly companies ignore the importance of this system and end up becoming a victim of cyber attacks.

Lack of new tactics to safeguard information

Day by day with the involvement of complex ICT techniques old techniques get obsolete and more vulnerable to security threats. It is thus an impeccable need for business ventures to update technologies in a regular basis to mitigate risks in future.

Human failure

Sometimes threats exist within an organization which makes it necessary for organizations to keep a track of internal employees. Whistleblowers not only breach privacy concerns but also breach ethical codes and thus when internal whistleblowers expose internal company planning or procedures, brand value and ethical dilemma both gets affected.

Potentiality of proper privacy policies 

As Internet of Things (IoT) has become omnipresent, it is important to follow privacy policies as it helps to avoid legal troubles. It has been shown by cyber risk federal regulations that compliance of privacy policies with company standards lowers the risk of privacy issues by 73.10%, business risks by 7.61%, reputational issues by 6.60%, legal troubles by 57.87%, information system issues by 41.62% and other minor risks by 12.18% (refer to appendix 1).

Most beneficial aspect of implementing privacy policies within an organization is the mitigation of legal risks even if security issues occur. Governmental guidelines also open opportunities for getting help in times of security issues. Moreover if APP guidelines are followed properly with the adjudication of theoretical frameworks, then privacy issues and information system issues also get reduced (Harris & Patten, 2014, p. 110).

Proper maintenance of security by abiding APP guidelines

Abiding each and every principle in APP is not necessary, but involvement of relevant principles might help to avoid legal as well as ethical dilemmas.

Use of layered security system

Use of security standards in every level of storage as well as processing of data help to mitigate data theft and manipulation at a considerable extent.

Privacy training to employees

Privacy training must be provided to employees in order to avoid operational and internal issues (Corones & Davis, 2017, p. 70).

Conclusion 

Vulnerability of information is very natural as well as inevitable in current scenario, where technologies get new appearances in a day to day format. While there are technologies to protect information, there are certain technical ways to break into security systems too. In order to be precise, it is impossible to restrict security issues completely, but there are some legal guidelines which can help to mitigate risks. It is therefore a mandate for companies to look into their privacy standards properly and abide by APP guidelines to avoid legal or moral problems. In future if companies devote their time to improve their security standards, security issues can be prevented.

Reference list

Allen, A.M. & Peloza, J., 2015. ‘Someone to watch over me: The integration of privacy and corporate social responsibility’. Business Horizons, vol. 58, no. 6, pp.635-642.

Almorsy, M., Grundy, J. & Müller, I., 2016. ‘An analysis of the cloud computing security problem’. arXiv preprint arXiv:1609.01107. vol. 22, no. 1, pp.1-6

Altuhhov, O., Matulevi?ius, R. & Ahmed, N., 2013. ‘An extension of business process model and notation for security risk management’. International Journal of Information System Modeling and Design (IJISMD), vol. 4, no. 4, pp.93-113.

Andress, J. & Winterfeld, S., 2013. ‘Cyber warfare: techniques, tactics and tools for security practitioners’. 3rd edn, Elsevier, Amsterdam.

Australian Privacy principle, 2017. Guide to developing an APP privacy policy| Office of the Australian Information Commissioner – OAIC. Oaic.gov.au. Available at: <https://www.oaic.gov.au/agencies-and-organisations/guides/guide-to-developing-an-app-privacy-policy> [Accessed on 23 Aug. 2017].

Baskerville, R., Spagnoletti, P. & Kim, J., 2014. ‘Incident-centered information security: Managing a strategic balance between prevention and response’. Information & Management, vol. 51, no. 1, pp.138-151.

BAYLY, L., 2017. Snapchat Got Phished: Employee Bank Details, IDs, Compromised. NBC News. Available at: <https://www.nbcnews.com/tech/tech-news/snapchat-hacked-again-employee-bank-details-ids-phished-n527866> [Accessed on 23 Aug. 2017].

Biener, C., Eling, M. & Wirfs, J.H., 2015. ‘Insurability of cyber risk: An empirical analysis’. The Geneva Papers on Risk and Insurance Issues and Practice, vol. 40, no.1, pp.131-158.

Chang, V., Kuo, Y.H. & Ramachandran, M., 2016. ‘Cloud computing adoption framework: A security framework for business clouds’. Future Generation Computer Systems, vol. 57, no. 1, pp.24-41.

Chung, F., 2017. Woolies let off the hook over Anzac breaches. NewsComAu. Available at: <https://www.news.com.au/finance/business/retail/woolies-let-off-the-hook-over-anzac-day-breaches/news-story/f6b74b1ce0139a7213cf6f83bfbb0c51> [Accessed on 23 Aug. 2017].

Corones, S. & Davis, J., 2017. ‘Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions’. Fed. L. Rev., vol. 45, no. 1, pp.65-75.

Dawson, M., 2015. New threats and countermeasures in digital crime and cyber terrorism. 2nd edn, IGI Global, New York.

Harris, M. & P. Patten, K., 2014. ‘Mobile device security considerations for small-and medium-sized enterprise business mobility’. Information Management & Computer Security, vol. 22, no. 1, pp.97-114.

Kramer, H. & Colin Walter, I.S.G., 2015. ‘The Influence of Software Vulnerabilities on Business Risks’. Technical Report, vol. 1, no. 1, pp. 5-60.

Michalos, A.C., 2017. ‘The impact of trust on business, international security and the quality of life’. How Good Policies and Business Ethics Enhance Good Quality of Life, vol. 2, no. 3, pp. 127-153.

Privacy Policy, 2017. Privacy Policy. Standards.org.au. Available at: <https://www.standards.org.au/Pages/privacy.aspx> [Accessed on 23 Aug. 2017].

Seo, D.J. & Kim, T.S., 2015. ‘Influence of Personal Information Security Vulnerabilities and Perceived Usefulness on Bank CustomersWillingness to Stay’. The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 8, pp.1577-1587.

Wu, D.D., Chen, S.H. & Olson, D.L., 2014. ‘Business intelligence in risk management: Some recent progresses’. Information Sciences, vol. 256, no. 12, pp.1-7.