Your SlideShare is downloading. ×
New technology - the threat to our information
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

New technology - the threat to our information

41,527

Published on

A tongue in cheek look at the threat to corporate information from new technology.

A tongue in cheek look at the threat to corporate information from new technology.

Published in: Entertainment & Humor
20 Comments
49 Likes
Statistics
Notes
No Downloads
Views
Total Views
41,527
On Slideshare
0
From Embeds
0
Number of Embeds
73
Actions
Shares
0
Downloads
506
Comments
20
Likes
49
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. New technology The threat to our corporate information
  • 2. I work in corporate communications. My job is to make sure the information we have is correct.
  • 3. The risk of wrong information is huge – think of compliance information security reputational risk
  • 4. It keeps me awake at night
  • 5. It’s part of my job to be on the lookout for new risks to our corporate information. The advent of new technology has led to new risks
  • 6. Now we face the gravest threat to the accuracy and compliance of our information. It’s called …
  • 7. The ‘ telephone ’
  • 8. The name comes from the greek words for ‘faraway’ and ‘sound’
  • 9. There isn’t just one ‘telephone’ – there are many variations
  • 10. But they all mean you can have a conversation with someone many miles away AS IF THEY WERE IN THE SAME ROOM
  • 11. The telephone is no respecter of corporate or even national boundaries
  • 12. One person can even speak to many at once in so-called ‘conference calls’
  • 13. In the right hands it could be a valuable business tool
  • 14. We can talk directly to our customers as if we were in their homes With the correct controls and firewalls in place we could allow them to talk to us
  • 15. But think of it in the wrong hands …
  • 16. Wrong information can pass easily and undetected from employee to employee
  • 17. Non-compliant information can be spread outside of the company itself It’s as simple as pushing some buttons and speaking
  • 18. This isn’t tomorrow – it’s now Your children could well be using the new ‘mobile phone’ technology right now . How do you know who they’re talking to?
  • 19. This isn’t paranoia – it’s real There’s reliable evidence that terrorists have used the telephone to plan atrocities
  • 20. How much damage has been done already?
  • 21. We don’t know
  • 22. How many people in our organisations own telephones and have used them during work time?
  • 23. We don’t know
  • 24. How much MISLEADING NON-COMPLIANT downright FALSE information is being passed on as you look at this?
  • 25. We simply don’t know
  • 26. Across the developed world, companies are struggling to impose order on this new frontier
  • 27. And it’s not just hard facts – corporate values and morale are vulnerable
  • 28. One top 50 company reported that an individual was overheard on the telephone referring to a challenge as a problem !
  • 29. We need to be able to monitor - who’s talking - to whom - what they’re saying The risk to the company is too great to just ‘trust in people and hope for the best’
  • 30. Until we have suitable controls in place …
  • 31. It’s essential that we rely on accountable methods of communication, with visible audit trails …
  • 32. Wikis, blogs and forums are the tried and tested ways. Every entry is named and attributable , and can be corrected if wrong. All corporate communication should take place this way
  • 33. How do you update and correct a telephone conversation when it’s done ? You can’t!
  • 34. In time the telephone may form part of an integrated communication strategy Until then …
  • 35. Use only web 2.0 technology - you’ve been warned !
  • 36. Norman Lamont Lloyds Banking Group

×