“To the business of BPO, facing future challengers today will ensure greater opportunities with managed and reduced liabilities while the business; stakeholders and industry are protected from insider threats.”
Kudos to BPO Summit Bangladesh 2015 for taking the initiative by helping the nation in achieving Digital Bangladesh Vision 2021 by aligning itself to that cause. Job opportunities are created for the skilled and trained youths in the field of ICT that opens the door to the world, welcoming businesses in with a promise of utilising technology and being competitive. Over time, sooner rather than later, Bangladesh will have to keep pace with intellectual property laws, privacy laws and data security laws in order to attract and keep foreign businesses. In becoming a digital nation, it is also imperative that the nation grow in tandem with the expectation of businesses and industries holistically.
BPO companies in Bangladesh can take advantage of protecting their business, and their clients, to look into the area of intellectual property and data security as a means to attract more clients and stay ahead of the curve before the respective laws are enacted or policies are created. How can businesses achieve this?
Business owners, almost everything in security now is in the concept of keeping the thieves out and that is why you use firewalls, anti-virus software and attending various cyber security seminars. Now the challenge that will follow in the effort of going digital is that you may be trying to cope with how to protect your confidential and business data from within your organization; whether it is customer’s database, intellectual property, or your business secrets. Remember Edward Snowden? Do Google the definition of The Snowden Effect.
It's a huge business challenge because when there is a leak from within the corporate network, you may have to disclose the breach, track it down, and further act on it with uncertain liability hanging upon you. As an example, compromised data from the banking sector can be used in a variety of ways like identity theft, access to other accounts, to apply for credit and even credit card purchases. Take your existing business and please ask yourself, if information is leaked from within your company, how can it be manipulated? The common denomination being financial gain to which greed pushes the boundary of creativity into being devious!
So there is an urgent need for your business to make sure that the data stays secure wherever they are stored and when it moves around the corporate network, there are controls in place to make sure it doesn't escape in an unauthorized manner by unauthorized personnel. Here, Data Leak Protection & Prevention (DLP) concept comes into consideration for protecting the corporate network.
A DLP concept is a strategy ensuring end users do not send confidential/critical information outside the corporate network. It also describes software products, a DLP-SYSTEM, that helps an organization control what data end users can transfer and can also resolve various business tasks, not just specific information security issues. A DLP System looks at data flowing out of your network and analyzes, "Is this data something I care about? Is it confidential?" Sending confidential email using Gmail, or downloading corporate files to a flash drive, or printing sensitive documents, a DLP System with policy would deny the employee permission from doing all of it.
Businesses too are exposed to strategic, operational and legal risks that affect the company’s bottom line and reputation. Add that with the exposure to social media and growth of digital data, the risk amplifies. An effective DLP System for a start should enable an organization to identify and manage these risks with little complication.
Organizational Risks to Manage in Relation to Insider Threat
|ü Intellectual property
ü Client’s personal data
ü Business know-how
ü Criminal Breach of Trust
ü Insider dealings
|ü Illegal distribution of corporate information
ü Tender process
ü Industrial Espionage
ü Unethical employee behavior
ü Collective mood among personnel
ü Productivity, KPI
|ü Regulatory compliance
ü Identification on source of leaks – hardware & user
ü Establishing a legally admissible evidence base by securing procedurally correct evidence
To the business of BPO, facing future challenges today will ensure greater opportunities with managed and reduced liabilities while the business; stakeholders and industry are protected from insider threats.
Managing Director for ICT Asia, Malaysia
Specializing in Data Leak Protection & Prevention