Hello everyone…this is Part 2 of 3 of our series called Cyber Security. In 2016, Accenture Consulting published a cyber security white paper (geared towards large organizations) that we thought would be of interest to business owners like you. This study goes into a more in-depth analysis supported by industry interviews and statistics. You can download this white paper in two formats; either the Executive Summary or the Complete Report.
Having worked for a forensic accounting firm for several years, I understand some of the challenges and vulnerabilities all organizations face, and that we as consumers face regarding cyber security. The challenge is, there doesn’t appear to be much access to simple, step-by-step, practical standards of cyber security available to small business owners to readily implement. This is a real problem! The white paper focuses its attention on cyber security threats of larger organizations, but we as small business owners can learn from their challenges, approaches and solutions. The small business owner (and individual alike) needs access to practical, actionable standards of practice against cyber security threats and the protection of their data.
When we think of cyber security from the perspective of a small business owner or as an individual, think about it in terms of our smartphones/ tablets/ and computers. We either grant permission for auto updates or regularly receive promptings to update and “accept” software company’s “terms and conditions” to either download or update the software on our devices. This “acceptance” grants those software companies access to our data through our phone cameras, microphones, phone records, pictures and access to other data files. It’s quite obvious that we have been conditioned to accept whatever terms and conditions are asked by these software companies in order to comply with their downloading/updating standards. Why should you grant access to all these requests for your smartphones solitaire game? What this means is that our data and our privacy are at risk. Our privacy and security are practically non-existent because we have blindly “accepted” software providers terms and conditions. We therefore have either knowingly or unknowingly relinquished our privacy, our data and control of our information, how it’s managed, secured and shared with others. This can and does have serious repercussions! How could we be then surprised that our information could be stolen and disseminated all over the globe? We have only ourselves to blame.
We would recommend reading the white paper referenced above by Accenture Consulting, and think about how large organizations are approaching this eminent risk. What can we as small business owners learn and implement from these organizations to better protect our privacy and data (and client data), and to help mitigate cyber security threats and breaches? We’ll post a follow-up in Part 3 of this series in a few weeks to address how we as business owners (and individuals) can take some practical and actionable measures to better control the security and privacy of our data. Well I should say, as best we can given that we live in a state of technological acquiescence…whether we choose to believe it or not. Until then, we hope you enjoy reading the white papers by Accenture Consulting. Back to you in a few weeks…
Contact Us if you would like to discuss business strategies for your business.
GMS BUSINESS CONSULTING – provides lawyers and business professionals with Accounting Services, Business Development Services, Business Optimization Services and Digital Marketing Services to help business professionals successfully organize, grow and operate their businesses more effectively and efficiently. We do NOT provide investment advice. Contact us if you are interested in learning more about our services, and in particular, about our M.A.P. (our 3-phase business development solution) to help you strategically focus and tactically grow your business. We would welcome the opportunity to speak with you.