Internet users `wide open to fraud'
Wednesday 03 September 1997
It says that, though most organisations have prepared documents outlining their Internet strategies, complete with benefits, costs and use, few have considered the security implications. Even those that have are often preoccupied with one or two particular areas of risk, remaining vulnerable in others.
"Security considerations should always be an integral part of the analysis of the benefits of Internet technology, not an optional extras to be included in the footnote of the Internet strategy," says Alan Bray, partner in Deloitte's forensic services operation.
He adds in "Inside Fraud", the firm's quarterly analysis of business crime: "The lack of security may lead to unauthorised access which can, in turn, lead to fraud involving corporate data, damage to systems and even unauthorised changes to web pages."
In order to ensure that an investment in the Internet is both appropriate for a particular business and secure in terms of the environment in which the business is operating, it usually pays to seek the advice of professionals aware of the latest issues in this area, Mr Bray says.
Particular attention should be paid to the services associated with Internet access and the security issues surrounding them. Those include the telephone, the connection from the Internet service provider, training, the firewall installation and the Web server maintenance contract. Organisations should ask themselves what passwords they have shared with service contractors and who knows everything about their computer "environment".
The article points out that various organisations have called for legislation to cover the theft of electronic information and the establishment of an Internet Crime Group and that others are exploring ways of combating "cybercrime".
At the very least, organisations should regularly review Internet security to ensure that procedures are keeping pace with new challenges and threats and that best practice is followed by both technical staff and users.
Mr Bray concludes: "To understand much current security practice, you have to imagine a shopkeeper carefully installing an expensive metal grille, infra-red camera and burglar alarm to protect his premises - and then going off on holiday leaving his back door invitingly wide open"
Isis burns woman alive for refusing to engage in 'extreme' sex act, UN says
Purity balls: Girls in the US making virginity pledges as fathers vow to 'protect purity'
Female Muay Thai champion hustles coaches to give them a beating
Puerto Rico, island of lost dreams: People are leaving the debt-hit territory in droves as near neighbour Cuba's star rises
16-year-old girl beaten and burned alive by lynch mob in Rio Bravo, Guatemala
- 1 Woman accidentally shoots herself in the head while posing for a selfie
- 2 Isis burns woman alive for refusing to engage in 'extreme' sex act, UN says
- 4 Female Muay Thai champion hustles coaches to give them a beating
- 5 16-year-old girl beaten and burned alive by lynch mob in Rio Bravo, Guatemala
£40-50K: Guru Careers: We are seeking an experienced Software / C# Developer w...
£35 - 40k + Benefits: Guru Careers: We are seeking a Software Developer (JavaS...
£30 - 35k: Guru Careers: A Senior Account Manager / SAM is needed to join the ...
£55000 - £65000 per annum + Benefits: Ashdown Group: Digital Marketing Manager...