ASC Go to Ashmead Software & Consulting Inc. home page
specialities button software button industries button about_asci button
Relational Database Development Web Development Media & Entertainment System Administration Data Warehousing & Business Intelligence Information Security

Information Security


In an e-commerce environment where the only constant is unrelenting change, there are two things one can rely on. The first is that there will be hackers out there that are one step ahead of you. The second is that the lawmakers will be one step behind.


Information Security

In an e-commerce environment where the only constant is unrelenting change, there are two things one can rely on. The first is that there will be hackers out there that are one step ahead of you. The second is that the lawmakers will be one step behind.

Both of these realities imply that no one can rely completely on defensive technology or the law to protect their interests. This places a significant burden on those who use network technology to constantly assess the risk exposures from all sources, and take all necessary prudent and economic action to manage them. This process involves five basic steps:

  1. Periodically revalue all network-exposed digital assets at risk, both tangible and intangible
  2. Promote awareness as to the latest developments in the world of cyber threats and defensive tactics
  3. Make sure investments in security remain commensurate with the assets at risk
  4. Constantly reinforce strong cultural awareness of digital liability management throughout the organization
  5. Maintain access to the technical and legal expertise needed to manage risk and respond to threats at all times

By proactively managing digital liability, one can thrive in a global economy that will become ever more reliant on network-enabled transactions to improve speed, conquer distance, and remove the inconsistency of human intervention.

There is, however, an old saying that goes: "Computers allow you to make more mistakes faster." We would propose an updated version that networked computers allow you to make more mistakes globally.

Electronic commerce exposes an organization, regardless of size or location, to an entire world of technology-enabled enemies and thieves who would threaten the integrity of a business for glory or profit. It also makes victims subject to the laws and litigators of countless states, countries, and municipalities where they have never had a physical presence. It is a certainty that the statutes will be as outdated as the case law is inconsistent and opaque.

With the enhanced threats, however, comes enhanced opportunity for those who do the best job of employing an enlightened and comprehensive information security program. These individuals and firms will be in a superior position to their peers and competitors to take maximum advantage of the connected global economy while keeping their risks at an acceptable, and manageable level no matter what the future brings.

Principles and Practice of Informati...
Linda Volonino
Buy New $83.20!
Privacy Information

With the enhanced threats, however, comes enhanced opportunity -- for those who do the best job of employing an enlightened and comprehensive information security program.



Home Principals About this site Email us

Ashmead Software & Consulting, Inc. specializes in the design, enhancement, and administration of relational  databases with particular emphasis on reliability, performance, and ease-of-maintenance.