Information Security For SMEs
Information Security For SMEs
Information Security For SMEs
jawad.abbas@gmail.com
+49-152-15705329
Affiliation: Institute of Business & Finance, Ali Block Garden Town, Lahore, Pakistan
imskhawar@gmail.com
+92-300-9689743
hussain.fawad@gmail.com
+92-321-9232923
jawad.abbas@gmail.com
+49-152-15705329
Abstract
Information Security Management(ISM) is a crucial factor for all organizations under current scenario of
business globalization. Companies are making efforts to make best use of technology including e-business.
Organizations have made huge amount of information available on their database, but has made it vulnerable to
all types of attacks by numerous hackers in the form of spams, malwares etc. Therefore, organizations have to
keep their database protected with latest security measures to ensure privacy and confidentiality of data. Semi-
structured interviews of 19 managers at various levels out of 48 requested SMEs’ were done to probe into their
views about confidentiality, integrity, availability and non-repudiations which are the major objectives of
information security. It is found that industrialist generally believe in security of information and its importance
to organization but mostly are only reactive in administrating information security. The result is that they react
in unprepared manner which finally results in loss of business as well as reputation. The findings provide strong
baseline for SME organizations to review their existing operating style and improve it by applying adequate
security measures.
1- Introduction
History stands witness to human endeavors which aimed at making this world a better place for living. Efforts
have always been made to bring the world closer, and with the advent of internet technology this dream of
mankind turned to reality. Since, its arrival internet has grown and is still growing substantially. It paved the
way for businesses to look beyond their range and attract customers from all around the world. Considerable
investments have been made by both large and small-to-medium sized enterprises (SME) to make the maximum
use of the internet in reaching out and getting the attention of the global network. However, there exists no real
utopia in this world; with the revolutionary effects of internet over business there came the risks and threats to
information security.
As the businesses have opted to utilize the internet based platform in attempting to reach out to the world, huge
amount of information is created (and in some cases converted) into digital format. This digital information
travels across the globe through “plethora of interconnected networks” [1], which is prone to cyber-attacks such
as phishing, spams, malware, viruses, trojans and other forms of cyber terrorism. In the present day
economically competitive business scenario, information is a valuable asset, and businesses may suffer huge
blows economically as well as to their repute if they fail to safeguard it. This con of internet, has not only
resulted in loss of information, but has also shaken the trust and confidence of the internet user over technology.
Business needs keep on changing with the passage of time and so does the requirement of the information
security measures. The security policies of the SMEs should be able to adapt to change and align it with the
changing business objectives. In order to ensure that the business is driving forward with the correct security
policies in place, security infrastructure transformation shall take place according to the enterprise’s strategic
business objectives.
Locked houses, safes in banks, security guards, and barb wired facilities etc. all aim at providing physical
security to assets. Information security is analogous to all such security measures however it is responsible for
providing data security in digital domain. There are four objectives of Information Security:
i. Confidentiality – Information shall be transferred to people on a need to know basis i.e. to keep the
information from reaching to unauthorized people.
ii. Integrity – Information stored in the computers should be kept guarded from being corrupted or
contaminated.
iii. Availability – Ensuring the availability of the data to the authorized people at right time. Both
confidentiality and availability ensures data integrity.
iv. Non-repudiation – Ability to prove the authenticity and integrity of the data
In order to have a successful business an organization needs to assess and analyze their organizational
information security requirement, make a clear strategy in dealing with the information security issues, link
their business objectives with the evolving needs of information security and communicate the importance of
information security and the implementation of the plan. SMEs with IT infrastructure aim at challenging the
larger businesses owing to their flexibility, efficiency and customized solutions. The stakeholders of any
business demand assurance towards information security as loss of it would cause a lot of damage. Having a
well-defined Information Security policies, plan and strategies would outshine an SME amongst its competitor
and would become an obvious choice for the customers to approach. Therefore, information security will not
only assist the SMEs in having a better and secure IT structure it will yield in customer satisfaction and a good
reputation which in turn will attract more business.
Information security cannot be realized without embracing it in the day-to-day working scenario. The link
between the enterprise’s goals and information security is crucial and SMEs shall align its security policies with
the evolving needs. Apparently tough decisions need to be made in terms of financial effects, but as mentioned
earlier in this paper to have an edge against competitors addressing the evolving needs of information security
and linking it with the business objectives would yield good reputation, contented customer and greater business
opportunities.
Network security concerns faced by large enterprises or SMEs are of the same nature. Larger enterprises having
greater budget in hand can opt out of numerous authentication products while SMEs with limited budget and
personnel have to cope their way through simple Microsoft passwords or other such security protocols.
Biometric security devices tend to provide access to the authorized user only through scanning their finger
prints or eye-pupil. It eliminates the need of punching user passwords every time an authorized personnel needs
to access the requisite information, providing user convenience and enhancing productivity.
2- Literature Review
The Information Technology (IT) infrastructure has brought great opportunities towards SMEs improving their
productivity and enabling them to compete against their larger enterprise adversaries. However this bounty
came with IT related risks and threats which if not addressed will cause serious blows towards the business and
demands for “sophisticated management” [2].
SMEs generally invest fewer resources and possess less expertise in establishing and maintaining IT security
policies and strategies. This deficiency of information security awareness and lack of proper information
security policies by SMEs make them an easy target for the cyber-terrorists. Despite the challenges and threats
faced by the SMEs, their employment and reliance on information technology is rapidly increasing, and the
business goals are directly being associated with the utilization of information technology. Symantec Global
SMB Survey of 2013 reports that owing to the weaker security measures of the small-to-medium sized
businesses almost 31 percent (which is thrice the frequency from 2012) of targeted attacks are focused on them
[2]. An information security breach survey undertaken in April 2012 by PricewaterhouseCoopers (PwC) LLP in
United Kingdom revealed that 76 percent of small business faced security breaches which on average cost £
15,000 - £ 30,000 in the worst of security breach [3].
According to [4], Information Security incorporates four levels within SMEs i.e. Organizational Level – It
includes decision making processes, defining security strategies, and corporate security culture and risk
management. Workflow Level is the integration of standardized security workflow methodologies and
development of secure business processes. Information Level involves access and control to facilities and
information storage sites / computers, data authorizations etc. The last but the least is Infrastructure Level which
states that at this level business network is being protected through hardware and software protections like
firewalls, anti-malware, anti-virus etc.
SMEs (or any organization for that matter) would suffer substantial damage towards their reputation as they fall
prey to information security attack. Incident response management enables the SMEs to identify and discover if
it is under attack, absence of such management would render the SMEs oblivious towards such an attack, not to
mention the harm which it would cause. Subsequently, disaster recovery strategy would assist the SMEs to
“contain the damage, eradicate the attacker’s presence and recover in a secure fashion” [5]. Owing to the
importance associated with Incident Response Management and Disaster Recovery for an organization, SANS
Institute of Internet Security United States has placed it in their list of 20 Critical Security Controls.
Furthermore, National Institute of Standards and Technology (NIST) United States have provided detailed
guidelines for the planning and implementation of these plans in their NIST Special Publication 800-61.
A clear and effective incident response management and disaster recovery plan would comprise of six phases
namely preparation, identification, containment, eradication, recovery and lessons learned [6]. SMEs should be
prepared to handle threats to their business critical information via their IT structure by having the right people
and tools placed in the enterprise. A prepared SME would be able to identify any breach in its information
security and would first contain the damage being caused by the breach followed by its complete eradication.
Subsequently, recovery process would be initiated which would close strengthen the weak links. Subsequently
lessons learned from the breach would assist in fighting similar breaches in future.
Moreover, this Incident Response Management and Disaster Recovery plan shall also include careful planning
to handle occurrences other than cyber intrusion like fire, storm, power surges etc. Survey results suggest that
55 percent of SMEs think that they would lose 40 percent of the information stored in their computer in case of
calamity like fire [7]. Considering the fact that in the present day scenario all the data of an enterprise is mainly
stored on computer drives, losing 40 percent of the data will be enough to put you out of business for a
considerable time.
Conclusion
In current era, privacy and security has become one of the most important areas in the field of information
technology. Organizations are spending millions of rupees to ensure the privacy of their data. “Prevention is
better than cure”, SMEs shall not wait till an Information Security breach has taken place. Information security
breach in any organization can has devastating effects. The loss of product information or any knowledge
pertaining to organization client, strategic business plans etc. can result on loss of existing customers as well as
potential ones. It can even cause operational breakdown and affecting profitability.
It has been found that most of SMEs’ are reactive in administrating information security despite knowing that
security of information is crucial for smooth operations of their business. In the event of breach of information
security, most of companies react in unprepared manner which result in loss of business as well as reputation.
Efforts shall be made by the SMEs to identify their business critical information, define policies in handling the
data, incident response plans, disaster management plans, employing appropriate software and hardware to
protect the data. With all the proper methods and techniques as discussed in this paper and others which are
important and are not listed SME may surpass all the barriers and be more productive and attain better
reputation and business.
References
1. TAWILEH, A.; HILTON, J.; MCINTOSH, S. Managing Information Security in Small and Medium Sized Enterprises: A
Holistic Approach. ISSE/SECURE 2007 Securing Electronic Business Processes, p. 331-339, 2007.
4. JI-YEU PARK, R. J. R. C.-H. H. S.-S. Y. T.-H. K. IT Security Strategies for SME's. Iternational Journal of Software
Engineering and Its Applications, p. 91-98, 2008.
5. SANS. The Critical Security Control. SANS Organization Web site, 2009. Disponivel em:
<http://www.sans.org/critical-security-controls/>. Acesso em: 17 October 2013.
6. POKLADNIK, M. An Incident Handling Process for Small and Medium Business. [S.l.]. 2007.
7. WHITEHOUSE, L. Small Business Data Protection Basics: What Small Business Owners Need to Know to Ensure
Business Continuity. Massachusetts. 2009.
8. ABBAS, J. et al. Impact of Technology on Performance of Employees (A Case Study of Allied Bank). World Applied
Sciences Journal, p. 271-276, 2014.