Blog - Opinion

The Jacoby Consulting Group Blog

Welcome to the Jacoby Consulting Group blog.
You will immediately notice that this blog covers a wide range of themes - in fact, whatever takes my fancy or whatever I feel strongly about that is current or topical. Although themes may relate to business, corporate or organisational issues (i.e. the core talents of JCG), they also cover issues on which JCG also feels warranted to comment, such as social issues, my books, other peoples' books and so on. You need to know that comments are moderated - not to stifle disagreement - but rather to eliminate obnoxious or incendiary comments. If a reader wishes to pursue any specific theme in more detail, specifically in relation to corporate, business or organisational issues, or in relation to my books, then the reader is invited to send an off-line email with a request. A prompt response is promised. I hope you enjoy this blog - sometimes informed, sometimes amused and sometimes empassioned. Welcome and enjoy.
JJJ

03 April 2011


Information security

Information security is part of the multi-dimemsional responsibilities of management. It's the board's responsibility to make sure they do it effectively and economically.

There is no generic answer to "How much security do we need" - it is of course context based.
The more sensitive the information, the more security is needed. The more the information can be used to enrich someone (or destroy someone), then the more security is needed. The more the organisation is planning for major change, the more security is needed.

"Enough security" is when the information is suitably secure. What the definition of 'secure' is, is however open to definition. Some data systems are considered secure if they cannot be breached using tools valued at $200,000 for example. That implies that if someone has sufficient motivation, all systems can be breached, but such a system is "safe" from the "casual intruder".

Therefore each organisation needs to determine its own threshold of tolerance. Using external consultants to recommend what that is may be useful.

0 Comments :

Post a Comment

Subscribe to Post Comments [Atom]

<< Home