Software // Enterprise Applications
11:25 AM
Risk Data as a Strategy
Apr 06, 2016
There is a renewed focus on risk data aggregation and reporting (RDAR) solutions, as financial ins ...Read More>>

Under Attack

Businesses are suffering more downtime as the threat from viruses and worms continues to grow

It's an issue about which business-technology managers are increasingly passionate, and their frustrations bubble up when discussing the topic. "We get better communication about their security problems" than about their security improvements, says Diane Bunch, senior VP for information services at government-owned power utility the Tennessee Valley Authority, in an E-mail interview.

Many security tools are poorly designed and don't work well together, says Adam Hansen, manager of information security for law firm Sonnenschein Nath & Rosenthal LLP. "They're either incomplete, have flaws, or don't communicate well," he says. "Companies are buying each other up, but they don't integrate the apps well afterwards." His solution? "Those products aren't around here anymore."

Many security tools are poorly designed, says Adam Hansen, manager of information security for law firm Sonnenschein Nath & Rosenthal LLP. -- Photo by Jeff Sciortim

Many security tools are poorly designed, says Adam Hansen, manager of information security for law firm Sonnenschein Nath & Rosenthal LLP.

Photo by Jeff Sciortim

In fact, some security tools are "insecure right out of the box," says Chris Hoff, chief information security officer and director of enterprise security services for Western Corporate Federal Credit Union. WesCorp is a financial-services cooperative that provides services to 1,000 corporate credit unions and has $24 billion in assets. WesCorp recently bought a security appliance that was configured so improperly that it created a security hole. "Security is such a hot item these days, and there is so much crap coming to market. It's just ludicrous," he says.

WesCorp scans its network and systems each day for the vulnerabilities that make attacks from hackers and worms possible, Hoff says. "We're never more than 24 hours out of date," he adds. Still, he doesn't rest easy. "You can never get too far ahead" of the attackers, he says.

Many security professionals use several layers of security and regularly add new types of tools to protect their systems. They're also trying to better understand which security threats are serious and need to be addressed immediately and which ones can be addressed later.

Most common antivirus and intrusion-detection systems use signature-based technology to recognize a threat by looking for a virus' fingerprint, or specific code. Those systems "do a good job, but they don't do a perfect job," says Michael Kamens, global network and security manager for Thermo Electron Corp., a $2.1 billion-a-year maker of electronic measurement and laboratory equipment (see story, p. 71). Thermo uses several layers of antivirus protection, including at E-mail gateways and desktop systems, but viruses still occasionally sneak through. "Isn't that disgusting?" he says.

One frustration many information-security managers feel is that security tools don't provide them with the right kind of information. If a software or hardware vendor rates a security vulnerability as a high risk, customers get flooded with warnings that systems need to be patched, regardless of how those systems are being used. What customers really want is to be able to understand the business risk of a threat so they don't spend a lot of time rushing to patch a relatively unimportant system, Hoff says. "I want to know how the investment division is doing versus other divisions," he says. "I want to be able to correlate vulnerabilities and see the actual risk [a threat] poses to the business."

Businesses are turning to tools that help them do more. Advo Inc., a $1.2 billion-a-year provider of direct-mail services, is supplementing its open-source Snort intrusion-detection systems with Enforcer and Profiler from network-security software maker Mazu Networks Inc. "We didn't want to put all of our eggs in one basket," says Phil McMurray, IT security officer at Advo. Mazu's heuristics-based Enforcer helps protect Advo's network from distributed denial-of-service attacks, the No. 3 threat after viruses and worms. Some 18% of survey respondents in North America say they were hit with such attacks in the past year, as do 26% in the Asia-Pacific region, 10% in Europe, and 14% in South America.

2 of 5
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Building A Mobile Business Mindset
Building A Mobile Business Mindset
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps and it's past time for those with no plans to get cracking.
Register for InformationWeek Newsletters
White Papers
Current Issue
4 Trends Shaping Digital Transformation in Insurance
Insurers no longer have a choice about digital adoption if they want to remain relevant. A comprehensive enterprise-wide digital strategy is fundamental to doing business today.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of April 24, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.