Securing Document Management Systems: Call for Standards, Leadership

By Harpaz, Joe | The CPA Journal, July 2005 | Go to article overview
Save to active project

Securing Document Management Systems: Call for Standards, Leadership

Harpaz, Joe, The CPA Journal

As companies become more reliant upon "paperless" electronic document management technologies, there is increasing need for those who manage this data to expand their knowledge base and implement security standards so that data cannot be compromised. For some, this means hiring full-time, in-house staff to manage security features, or expanding the role of existing IT resources. For others, retaining an outside vendor that can provide this type of expertise, including software, hardware, and maintenance, is easier and less expensive. Whichever option a company chooses, it should become more involved in setting the standards for the security of client financial data.

What Makes a System secure?

Many businesses think that information that is housed off-site and managed by an outside firm is less secure. In reality, most electronic data management companies are extremely stringent about security measures. They will secure the entire system, scan for vulnerabilities, provide back-up solutions, and update and maintain software regularly.

Many software and database applications originally designed to be run on internal networks, with security on a very basic functionality level. Increasingly, corporated networks are now connected to the Internet, making them (and the applications on the network) potentially available to an intruder. If these systems are not consistently updated and maintained with proper security features, a network may be exposed to outside vulnerabilities.

When assessing security risks, the company should look at every layer of the system: the program (e.g., document management software), the network (e.g., firewalls), and the operating system (e.g., Microsoft Windows). Any gaps in these layers and the company is at risk.

Where data reside-in-house, on a network, or on the Internet-has little to do with security. The key is to maintain procedures and manage security updates on an ongoing basis. For example, Microsoft provides almost daily updates on vulnerabilities in its systems and on how to patch and update the systems. But if no one in a company is implementing these updates daily, the data are vulnerable. Vendors that publicly post their security vulnerabilities inherently expose themselves to those risks as they become known and accessible to those looking to leverage weaknesses.

Surprisingly, the majority of information theft in corporations is committed by employees, not by outsiders or so-called hackers. According to a survey reported by MSNBC technology correspondent Bob Sullivan in May 2004, as much as 70% of all identity theft starts with the theft of personal data from a company by an employee. Many businesses fail to consider this when examining their electronic information systems. Having an in-house IT administrator with access to everything within the company's data banks may present a major source of risk.

Basic guidelines for managing a secure network and application environment include the following:

* Stringent policies and procedures;

* Physical security, including setting limitations for equipment and network access;

* Ongoing efforts to update, patch, and maintain all components to applications so all known vulnerabilities are fixed regularly;

* Vulnerability estimates, including regular scans of the entire system, for errors or configurations that could present security "holes"; and

* Management of audit trails and audit logs to monitor access to information for indicators of unusual activity or intrusions.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Securing Document Management Systems: Call for Standards, Leadership


Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?