Why do you think that employees in organizations featured

Assignment Help Operation Management
Reference no: EM132086123

Raymond James Financial, BCD Travel, Houston Texans, and Others: Worrying about What Goes Out, Not What Comes In

and issues alerts when policy violations are found. Network-based systems do more than just rule-based scanning for Social Security numbers and other easily identifiable content. They typically analyze sensitive documents and content types and generate a unique fingerprint for each. Administrators then establish policies that relate to that content, and the system uses linguistic analysis to identify sensitive data and enforce those policies as information moves across the corporate LAN. The systems can detect both complete documents and “derivative documents,” such as an IM exchange in which a user has pasted a document fragment. When BCD Travel began to investigate what it would take to get Payment Card Industry (PCI) certification for handling customer credit card data, Brian Flynn, senior vice president of technology, realized that he didn’t really know how his employees were handling such information. Not only could PCI certification be denied, but the travel agency’s reputation and business could also be harmed. At the National Football League’s Houston Texans, IT Director Nick Ignatiev came to the same realization as he investigated PCI certification. In both cases, vendors they’d been working with suggested a new technology: outbound content management tools that look for proprietary information that might be leaving the company via e-mail, instant messaging, or other avenues. Flynn started to use Reconnex’s iGuard network appliance, with vivid results. “It was a shock to see what was going out, and that gave us the insight to take action,” he says. After Ignatiev examined his message flow using Palisade Systems’s PacketSure appliance, he too realized that his employees needed to do a better job protecting critical data, including customer credit cards, scouting reports, and team rosters.How does the technology work? Basically, the tools filter outgoing communication across a variety of channels, such as e-mail and IM, to identify sensitive information. They’re based on some of the same technologies—like pattern matching and contextual text search—that help antivirus and antispam tools block incoming threats. Tools typically come with basic patterns already defined for personally identifiable information, such as Social Security and credit card numbers, as well as templates for commonly private information, such as legal filings, personnel data, and product testing results. Companies typically look for three types of information using these tools, notes Paul Kocher, president of the Cryptography Research consultancy. The first, and easiest, type is personally identifiable information, such as Social Security numbers and credit card information. The second type is confidential company information, such as product specifications, payroll information, legal files, or supplier contracts. Although this information is harder to identify, most tools can uncover patterns of language and presentation when given enough samples, Kocher notes. The third category is inappropriate use of company resources, such as potentially offensive communications involving race. The traditional security methods may restrict sensitive data to legitimate users, but Flynn and Ignatiev found that even legitimate users were putting the data, and their companies, at risk. At BCD Travel, a corporate travel service, nearly 80 percent of its 10,000 employees work in call centers and thus have legitimate access to sensitive customer information. BCD and the Texans did not find malicious activity; instead, they found people who were unaware of security risks, such as sending a customer’s credit card number by e-mail to book a flight or room from a vendor that didn’t have an online reservations system. Fidelity Bancshares Inc. in West Palm Beach, Florida, is using the message-blocking feature in PortAuthority from PortAuthority Technologies Inc. in Palo Alto, California. Outbound e-mail messages that contain Social Security numbers, account numbers, loan numbers, or other personal financial data are intercepted and returned to the user, along with instructions on how to send the e-mail securely. Joe Cormier, vice president of network services, says he also uses PortAuthority to catch careless replies. Customers often send in questions and include their account information. “The customer service rep would reply back without modifying the e-mail,” he says. “The challenge with any system like this is they’re only as valuable as the mitigation procedures you have on the back end,” notes Fredriksen. Another key to success is educating users about monitoring to avoid “Big Brother” implications. “We are making sure that the users understand why we implement systems like this and what they’re being used for, he says.Mark Rizzo, vice president of operations and platform engineering at Perpetual Entertainment Inc. in San Francisco, learned in a previous job the consequences of not protecting intellectual property. “I have been on the side of things disappearing and showing up at competitors,” he says. The start-up online game developer deployed Tablus’s Content Alarm to remedy the problem. Rizzo uses it to look for suspicious activity, such as large files that are moving outside the corporate LAN. Now that the basic policies and rules have been set, the system doesn’t require much ongoing maintenance, he says. Still, Rizzo doesn’t use blocking because he would need to spend significant amounts of time to create more policies in order to avoid false positives. Although companies in highly regulated industries can justify investing in outbound content monitoring and blocking tools, other organizations may have to sharpen their pencils to justify the cost. These are very expensive solutions to deploy. Fredriksen, who built a system to support 16,000 users, says that for a setup with about 20,000 users, “you’re in the $200,000 range, easily.” With outbound content management tools, “you can build very sophisticated concept filters,” says Cliff Shnier, vice president for the financial advisory and litigation practice at Aon Consulting. Typically, the tools come with templates for types of data that most enterprises want to filter, and they can analyze contents of servers and databases to derive filters for company-specific information, he says. (Consulting firms can improve these filters using linguists and subject matter experts.) As any user of an antispam tool knows, no filter is perfect. “A big mistake is to have too much faith in the tools. They can’t replace trust and education,” says consultant Kocher. They also won’t stop a determined thief, he says. Even when appropriately deployed, these tools don’t create an ironclad perimeter around the enterprise. For example, they can’t detect information that flows through Skype voice over IP (VoIP) service or SSL (Secure Sockets Layer) connections, Kocher notes. They can also flood logs with false positives, which makes it hard for IT security staff to identify real problems. That’s why chief information officers should look at outbound content management as a supplemental tool to limit accidental or unknowing communication of sensitive data, not as the primary defense. Fredriksen says that although Vontu is important, it’s still just one piece of a larger strategy that includes an overlapping set of controls that Raymond James uses to combat insider threats. “This augments the intrusion–detection and firewall systems we have that control and block specific ports,” he says. “It’s just a piece. It’s not the Holy Grail.”

Questions :

1- Barring illegal activities, why do you think that employees in the organizations featured in the case do not realize themselves the dangers of loosely managing proprietary and sensitive information? Would you have thought of these issues??

2- How should organizations strike the right balance between monitoring and invading their employees’ privacy, even if it would be legal for them to do so? Why is it important that companies achieve this balance? What would be the consequences of being too biased to one side?

3- The IT executives in the case all note that outbound monitoring and management technologies are only part of an overall strategy, and not their primary defense. What should be the other components of this strategy? How much weight would you give to human and technological factors? Why?

Reference no: EM132086123

Questions Cloud

What amount of income would be credited : Wheadon, Davis, and Singer formed a partnership with Wheadon contributing $67,200, Davis contributing $56,000 and Singer contributing $44,800.
Research into professional expectations : What information did you uncover from your research into professional expectations which you found useful for planning your degree?
Knowing this help you become more emotionally intelligent : How does knowing this help you become more Emotionally Intelligent?
Are you entitled to workers compensation : You obtained an internship with a professinal baseball team, Are you entitled to workers' compensation ?
Why do you think that employees in organizations featured : why do you think that employees in organizations featured in case do not realize themselves dangers of loosely managing proprietary and sensitive information
Calculate the amount of depreciation expense : Assuming a financial year ending 30 June, calculate the amount of depreciation expense for each year ending 30 June 2016 through to 30 June 2020.
Major corporations used weak ties to fine-tune strategies : Identify as to how the major corporations used weak ties to fine-tune their strategies? Today entrepreneurs can find weak ties easily- Why?
What amount was received for the bonds : West Valley Corporation issues exist800,000 of 20-year, 9 percent bonds at 95. Interest is paid semi-annually, and the effective interest method.
Active corporate responsibility programs : Many business are have active corporate responsibility programs in place. Describe what Macy's company is doing to fulfill their discretionary responsibilities.

Reviews

Write a Review

Operation Management Questions & Answers

  Recognize two companies in unrelated industries that use

identify two companies in unrelated industries that use tpm approaches to ensure reliability in the products or

  Explain the conscious theory of contracts

A claims that she and B entered into a contract. The intent to enter into a contract is determined with reference to Answer the conscious theory of contracts.

  If you were the ceo of samsung how would you respond

Based on what you have learned in class, if you were the CEO of samsung, how would you respond to this situation?

  What are the tax consequences

What are the tax consequences of Danielle's ownership of this stock fund after owning it for only eight months and earning $4,000 when she sold the stock? [Danielle is in a 33 percent marginal tax bracket.]

  Based on past experiences and connections formed

Which of the following is the theory that learning occurs based on past experiences and connections formed?

  What has been experience with networking

What has been experience with networking? What difficulties have you experienced with networking? What are the networking strengths and weaknesses?

  Determine the critical path

From your activity network, determine the critical path and identify any slack within your project. As you develop your project network be sure to think critically about each activity and use your best estimate of the time for the activity. How ha..

  Expand the present operation by adding one new outlet

The owner of Genuine Subs, Inc., hopes to expand the present operation by adding one new outlet. She has studied three locations. Each would have the same labor and materials costs (food, serving containers, napkins, etc.) of $1.70 per sandwich. Sand..

  Supply chain involves working on forecasting-risk pooling

Creating a more demand-responsive supply chain involves working on forecasting and risk pooling.

  Hull insurance is a separate policy from liability coverage

Using Marine Insurance For any examples you want to provide, discuss how insurance providers limit the coverage for liability loss events. (As an example, hull insurance is a separate policy from liability coverage for cargo.) Suggest anything you th..

  Law the patient protection and affordable care act

In 2010, the US Congress passed and President Obama signed into law the Patient Protection and Affordable Care Act (ACA).

  Important to deliver a comprehensive scope statement

Explain why it is important to deliver a comprehensive scope statement at the beginning of the project. Are there any instances where the scope statement can or should be omitted?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd