Thursday, September 01, 2005

Finance Backs Away from E-mail

View in your Web browser.
MANAGING COMPLIANCE STANDARDS

Sponsor: Intuit Quickbase
Web-based project, sales, IT management and more. Gain visibility, control access to data, share files and info instantly. Perfect for mid-size and large companies. Free 30-day trial!

Hot White Papers
View entire Research Library

 

Sept. 1, 2005
Banks face increasingly stiff compliance issues, and some have moved away from open platforms like e-mail for communicating with customers.
Also in this Issue
'E-Mail Wiretapping' Prosecutions Could Increase
Men More Likely to Steal Company Data
An Integrated Compliance Approach
 
Top Insights

Mondaq: The Treasury Department's Office of Foreign Assets Control has updated the Bank Secrecy Act/Anti- Money Laundering Examination Manual. The update includes examination procedures to determine compliance with the regulatory scheme enforced by OFAC. While OFAC rules do not require financial institutions to adopt a compliance program, the manual says that such a program is suggested by sound banking practice. Among suggested features: identify high-risk areas and transactions, develop internal procedures and controls, and create employee training programs. (Free registration required)
SPONSOR

 
ADDITIONAL READING:
eWEEK: A federal appeals court recently ruled that criminal charges could be lodged against an e-mail service provider who allegedly read customer messages. The case was brought against Bradford Councilman, former vice president of the online bookstore Interloc, under the federal wiretap statute. The ruling may foreshadow an increasing number of similar prosecutions in the future. The court found that the wiretapping statute contains no direct indication that Congress intended to exclude communications in transient storage from the definition of criminal wiretapping activity. Councilman was indicted for creating a Procmail script that allowed him to sort and read customers' e-mail with the "@interloc" address. The court's decision may also have broader applications, possibly criminalizing illegal spying on e-mail, voice mail and Voice over Internet Protocol calls.
 
ADDITIONAL READING:
Sponsor: VoIP Business Case Resource Kit

Understand, Quantify and Explain the VoIP Opportunity
Save 20 hours or more of your valuable time with our background research, pro forma financial calculations, and ready-to-use PowerPoint presentation. Make the right decision on this critical technology and back it up!

> Get more info.

TechWeb: Ninety-one percent of the companies assessed in July for the monthly Insider Threat Index exposed credit card numbers and 82 percent exposed employee Social Security numbers. The index is generated monthly by Reconnex, a Mountain View, Calif.-based enterprise risk management vendor. The vast majority of the exposures originated with human resources departments, according to the Reconnex report. HR often accidentally exposes employee information when it communicates with health insurance, payroll, workers compensation and other providers. In other cases, the Reconnex report contends, employees are exposing data by sending files using Web e-mail services like Hotmail and Yahoo Mail.
 
ADDITIONAL READING:
vnunet.com: Malicious crimeware being developed by phishers is becoming increasingly adept at bypassing conventional IT security systems to steal identity information for financial crime, according to a report from the Anti-Phishing Working Group. APWG researchers found that phishers are designing systems to neutralize anti-phishing technologies being deployed by financial institutions and e-commerce sites. They reported a noticeable increase in screenscraper technology which counters graphical keyboard measures. Graphical keyboards avoid keylogging Trojans used to mine usernames and passwords directly from keyboard entries. When a user clicks on a character on the graphical keyboard, the screenscraper takes a snapshot of the screen.

Special Offer: Free Info~Tech White Paper

Learn How Encryption Can Protect Your Most Important Business Assets
Encryption is a complex technology, so there are many challenges inherent in deciding what to encrypt, selecting the right encryption method, and determining which computing environments can support that encryption. Info~Tech Research Group uses a business-case approach to clarify these issues and present them in a context business decision-makers can understand. Learn more by reading this independently produced white paper, available for a limited time courtesy of thawte.

AIIM: Enterprise Content Management (ECM) technologies are increasingly viewed as core IT infrastructure as opposed to departmental applications. That was among the findings of a study released by AIIM, an industry group representing ECM vendors. Eighty-two percent of users see ECM solutions as a core element in their IT infrastructure, while 18 percent view ECM as a point solution to a particular problem. Return on investment appeared to be positive, with 72 percent of end users believing that the ROI of their ECM implementations met or exceeded expectations. The awareness of the importance of managing documents is also rising within organizations. Seventy-seven percent of end users believe that effective document management is more important now than it was two years ago. ECM technologies, including records management and e-mail management systems, are increasingly being deployed to tackle compliance issues.

Sydney Morning Herald: A Microsoft executive recently visited New Zealand in an effort to convince officials there not to pass an anti-spam bill Microsoft considers too broad. The bill would prohibit companies from sending even a single e-mail to a consumer unless they could reasonably infer the recipient's consent. The original version of the bill classified unsolicited mailings as spam only if the sender sent multiple messages. Microsoft believes the bill would prevent companies from e-mail marketing. The company wants to see the bill changed to allow companies to e-mail customers about new products and services, even if they had opted out of receiving e-mails in previous purchases. Companies should be able to send marketing e-mails to people who may not have a pre-existing business relationship with the company, in Microsoft's view, as long as spams are labeled with ADV for advertisement. New Zealand's Communications Minister rejected that proposal as too weak.

Banking Technology: Losses from phishing scams at automated teller and point-of-sale machines are smaller than originally feared, according to new research from TowerGroup. TowerGroup says the notion that ATM and debit card fraud from phishing is out of control is a misconception. In fact, the true effect is minimal. TowerGroup found that no more than $990 million was fraudulently lost at ATMs and POS installations in the U.S. in 2004 and, of that, less than one percent resulted from phishing. TowerGroup found that about one in every 15,600 ATM and PIN-based POS debit transactions is fraudulent, but that almost all of this comes from stolen cards and card skimming. TowerGroup said it conducted its research to counter recent findings from Gartner issued saying that ATM/POS phishing fraud in the U.S. generated losses of $2.75 billion last year.

silicon.com: Men are five times more likely than women to steal sensitive corporate data or intellectual property, according to a survey of British employees released by Clearswift. Five percent of male employees admit to deliberately e-mailing sensitive data to outside parties, compared to one percent of females. Some of these leaks resulted from failing to follow established practices for handling sensitive information rather than from actual malice. Another recent study found that women are more likely to bring portable storage devices, such as digital cameras, to the office. Clearswift says the results show the necessity of training staff to handle data appropriately.

IT Marketplace
Hardware
The Adonis 1000 DNS/DHCP Network Security Appliance
Citrix Access Gateway - a Universal SSL VPN Appliance
CommandCenter - Enterprise IT Infrastructure and Server Management
Software
Intentia ERP Application Suite
Multi-user Team Management System Provides Out-of-box Solution
Mailstream Manager - Unified Email Security for Large Corporations
Events
IDC Mobile Enterprise Forum - September 21, New York, NY
White Papers
Proven Techniques to Improve Query Performance
White Papers (continued)
Business Reality of the Mid-Market Real-Time Enterprise
Managing Risk Without Expensive Technology or Costly Talent
IT Executive Survey Results: Info Management Trends 2005
Publications
Guide to Portfolio Management Includes Numerous Office Templates
All the Basics of IT Management
Training & Tools
Best Practices Guide Walks You Through IT Strategic Planning
Optimizing Your Infrastructure: A Best Practices Methodology
IT Operations Guide Perfect for IT and non-IT Managers
IT Services (listings available)
Jobs (listings available)
Tell the IT Business Edge audience of technology decision makers about your product, service, event, or job. Click here to list it in the IT Marketplace!

3 QUESTIONS:
An Integrated Compliance Approach

With Luc Brandts, founder and chief technology officer of BWise.

Question: How are companies approaching Sarbanes-Oxley compliance in your experience?
Brandts: What we see is that they are dealing with compliance issue-by-issue and year-by-year. A lot of companies are in a big mess, and they just want to it get over with and get compliant. Some companies are spending huge amounts of money looking at automated solutions to do just that. Some of those companies now want to use compliance to become a better company by improving alignment, reducing IT costs and complexity, and improving quality. But others still take a check-the-box approach. At the end, they know they're compliant, but that's it. They've incurred high costs and there's no benefit to the company. We think this is a shame.

Question: What's a better approach?
Brandts: Compliance provides a wealth of information on what processes are in place, what is at risk, what IT systems are deployed, and where. This can be used for the benefit of the company. In Sarbanes-Oxley projects there is an immediate need to document a lot of stuff, and when you do that you see that it links to a lot of other things. One of the most important parts of compliance is IT governance. You need an integrated way to document where the risks are and what controls are being placed on applications and hardware. You also need to find a way to properly test that and combine it with corporate governance efforts at the CFO level. From the corporate governance perspective, you need a process approach and to be able to document process risks and controls to make sure that if something goes wrong it doesn't become a big mess. You have to link business processes to applications so that if something changes in the application, you know which processes are linked to that.

Question: Can you give an example of how companies can derive business benefits from compliance processes?
Brandts: Regulators are asking companies to take a more risk-based approach to Sarbanes-Oxley compliance. In a finance department, for example, they are used to working with a lot of controls. That is the way the applications were developed, and that is the way finance people are trained. The question then becomes whether these processes are over-controlled. There may be a risk that payroll is done twice. But then you find out and correct the situation. That may cost you some money, but it costs less than changing the application or adding an additional person to do an additional check. All that does is add costs and frustration without reducing much risk. On the other hand, I know of a company that had an organization involved with submitting tenders for contracts which had poor controls. Losing three tenders a year would have cost the company 20 percent of its revenue. If not properly controlled, this company could have a different look within a year. So it's really a question of spending money and energy on improving things that can have a significant impact on revenue and not spending effort in an environment like payroll that is easy to manage.

 
Also from IT Business Edge: Leveraging Open Source
Leveraging Open Source gives you a comprehensive view of open source adoption in the enterprise. From Linux's growing role in the mid-tier server market to open source corporate blogging software, the open source movement is making inroads in the enterprise. Click here to sign up!

By the Numbers

10 to 20 percent
Amount of corporate IT budgets allocated toward initiatives that improve business performance. (Free registration required)

90 percent
Proportion of companies that regularly expose personal information, according to the Insider Threat Index.
Source: TechWeb

80 percent
Proportion of consumers surveyed who feel threatened by online fraud and identity theft, according to a survey released by RSA Security and LightSpeed Research.

Breaking Headlines

eWEEK: The Department of Homeland Security's information systems are plagued with ongoing weaknesses, according to a recent audit. The report found that DHS has not fixed vulnerabilities — particularly access controls — that had been previously identified. Users were sometimes able to access sensitive testing and development devices with a group password or a default password. DHS also faces the challenge of implementing agency-wide patching; the department joins 22 separate IT architectures. The agency plans more training programs, among other efforts, to address the issues raised.

FCW.com: The estimates issued by the Congressional Budget Office for the implementation of the Real ID Act are being dwarfed by figures being reported by the states. The Real ID Act mandates that states enhance the security and data integrity of driver's licenses and other state-issued documents. The CBO initially estimated a $100 million total cost over five years. But Washington State says the program will cost it $97 million, Pennsylvania estimates $100 million, and Virginia claims the program would cost $232 million. The largest part of these estimates is for staffing and document verification. States are waiting for the Department of Homeland Security to identify standards and procedures, while privacy advocates continue to express concerns about the program.

FCW.com: The U.S. government wants to change judges in a lawsuit brought by a group of American Indians against the Department of the Interior. Judge Royce Lamberth has presided for 12 years over a lawsuit that claims the Interior Department did not adequately protect databases related to American Indian trust funds. One of Lamberth's rulings called Interior a "dinosaur" and found the government's papers in the case to be disrespectful. He has ordered Interior three times to disconnect from the Internet departmental computers that could access trust fund data, but was overruled by an appeals court each time. Lamberth also ordered the Bureau of Indian Affairs to disconnect its networks for two months in the spring of 2005 after the departmental inspector general found them vulnerable to cyberattack.

Emerging Trends

GCN: Many e-mail recipients are fooled by phishing scams that appear to have been sent from within their organizations. Security exercises conducted by the U.S. Military Academy and the New York State chief information security officer resulted in these findings. The exercises were carried out to test the effectiveness of awareness programs. Educating e-mail users has had only limited success, according to a West Point faculty member. The first test e-mail, sent to 400 West Point cadets, received an 80 percent clickthrough rate. Subsequent exercises with as many as 3,000 cadets produced lower, but not sharply lower, response rates. The New York CISO reported similar findings in tests of 10,000 state employees. E-mail bearing the names of officials within an organization appeared to enjoy a high level of credibility.

silicon.com: A public-private educational program on online security will likely not adequately address the problems of consumer Internet safety, in the opinion of this writer. The Get Safe Online public-private partnership program is a last-ditch effort to turn back a tidal wave, he says, which was foreseen by everyone except the government. The British government was slow to respond to online consumer issues, but it was finally galvanized by reports showing that 25 percent of the world's zombie computers are located in the UK. The situation is comparable to the terrorist threat in which the government response is too little, too late.

SecurityFocus: Should security researchers be allowed to decompile software to expose vulnerabilities? The case of Michael Lynn, who resigned from Internet Security Systems to give a presentation on flaws in Cisco software, has re-opened the debate. Cisco and ISS filed an injunction against Lynn, claiming he violated Cisco's copyrights and End User License Agreement when he decompiled code as an ISS employee after signing a Non-Disclosure Agreement. Courts have come down on both sides of the issue. In Atari Games Corp. vs. Nintendo of America Inc. and in Sega Enterprises vs. Accolade Inc., courts held that reverse engineering of software falls under the fair use provisions of copyright law and is therefore not actionable. But in 2003, another court, in Bowers vs. Baystate Technologies Inc., decided that consumers waive those fair use rights when accepting a software's End User License Agreement. One solution is for licensing agreements to authorize decompiling of software and at the same time act as a non-disclosure agreement which defines procedures for the disclosure of flaws discovered in this manner.

IT Business Edge: Managing Compliance Standards
Issue 35, Vol. 2
DISCLAIMER: At the time of publication, all links in this e-mail functioned properly. However, since many links point to sites other than itbusinessedge.com, some links may become invalid as time passes.
This e-mail is sent by: NarrowCast Group, LLC, 124 N.First St., Louisville, KY 40202
Copyright ©2003-2005 NarrowCast Group, LLC. All Rights Reserved.

Hot Solutions
ItonMail Secure Anti-Virus Gateway
Citrix Access Gateway Universal SSL VPN Appliance
Google Mini
Adonix X3 ERP Manufacturing, Distribution and Supply Chain Management
ViewWise Document Management Solutions
Search entire
IT Solution Directory

powered by

IT Best Practices
Guides and Templates


Strategic IT Planning and Governance

Building a Comprehensive Disaster Recovery Plan

IT Operations Guide
 

Optimizing Your IT Infrastructure

 

Securing Your IT Environment

Policies and Procedures
IT Operations Essentials


IT Operations Guide

  IT Planning Bundle
  2005 IT Compensation Study
  Strategic Outsourcing Framework
Outsourcing Process Templates
PortfolioStep Portfolio Management System

Find Related Technology Solutions
Compliance Management/Sarbanes-Oxley Compliance
Information Lifecycle Management
Risk Management
Vulnerability Assessment
Access Control
Storage Management
Database Administration
Data Warehousing
Data Privacy
Electronic Medical Records
Search entire
IT Solution Directory

powered by

Find Related
IT Contract Resources
Find consultants and contractors with the skills you need in your area!
Sarbanes-Oxley
HIPAA: Peoplesoft, SAP, etc.
Risk Based Audit
Search entire
Contractor Database
Get listed now!
Consultants or Firms

Training Products
IT and Management Skills


IT Manager Development Series

  IT Management Essentials Bundle
IT Management Development Mega Pack
PortfolioStep Portfolio Management System
  Strategic Outsourcing Framework

Policies and Procedures
IT Operations Essentials


IT Operations Guide

  IT Planning Bundle
  2005 IT Compensation Study
  Strategic Outsourcing Framework
Outsourcing Process Templates
PortfolioStep Portfolio Management System

IT Security
Guidelines and Tools
 


Security Manual Template

Disaster Recovery Plan Process Kit
  Securing Your IT Environment Best Practices Methodology
  Firewalls: The InfoWorld Test Center Product Guide

Business Case Kits
Background and Templates


VoIP Business Case Resource Kit

  Spam Filtering Business Case Resource Kit
  Blade Server Business Case Resource Kit
  CaseBuilder for IT Initiatives

Info-Tech Research
Premium Analyst Reports


How to Select a Security Outsourcer

  A Strategy for CRM Selection
  Dissecting .NET for for IT Decision Makers
  Enterprise Wireless Networking: A View to the Future
  Linux on the Desktop
  Portals: Separating Myth from Reality

Weekly Reports


About the Editor

Peter Buxbaum has been writing about business, technology, and law for 12 years. He has published over 1,000 articles in publications such as Fortune, Forbes, Chief Executive, Computerworld, InformationWeek, and dozens of others. He earned a law degree from Temple University, studied economics at Columbia University, and taught seminars in international business at Penn State University. He can be reached at editorial@
itbusinessedge.com
.
   
 
   

0 Comments:

Post a Comment

<< Home