SlideShare ist ein Scribd-Unternehmen logo
1 von 14
27
fea
t
u
r
e
ar
t
i
c
l
e
© 2015 Wiley Periodicals, Inc.
Published online in Wiley Online Library
(wileyonlinelibrary.com).
DOI 10.1002/jcaf.22031
by the treasury function. Those
challenges and some important
information technology (IT)
security and compliance con-
siderations are presented in this
article.
Because smaller organiza-
tions may lack the resources for
full and complete cybersecurity,
the article is written primarily
for the treasurers of the small or
midsized organizations. But any
John A. Pendley
Information Security and Cloud-Based
Computing: Tools for the Corporate
Treasurer
C
orporate treasur-
ers are responsible
for a great variety
of activities. In addi-
tion to policymaking
roles, treasurers may
also be responsible
for certain day-to-day
activities, particularly
those related to cash
management and
investment policy. For
example, some treasur-
ers are responsible for
the management of
customer invoicing, bill
payment, cash trans-
fers, and securities pur-
chases and sales. With
such a wide breath of activities,
it seems overkill to add informa-
tion security to the mix. But,
unfortunately, such must be the
case in today’s information pro-
cessing environment.
This article describes cyber-
security issues for the financial
treasurer. The treasurer faces
some unique challenges because
of the low-volume, high-value
transactions typically handled
financial manager
involved in treasury-
related functions
should have a work-
ing knowledge of
data security basics.
ARE YOU
PREPARED?
Many types
of data routinely
handled by treasury
departments are
vulnerable to data
loss or compromise.
Cash transfers are
routinely made in
order to manage
cash balances and ensure the
availability of funds across the
organizations’ functions. These
transfers involve important and
sensitive data, including account
numbers, passwords, transaction
identifiers, and routing numbers.
Many treasurers oversee
investments and manage debt.
To do so requires the execution
of securities transactions
that involve accounts, fund
This article describes cybersecurity issues for
the financial treasurer. Although job descriptions
for corporate treasurers probably don’t mention
systems and information security, many treasury
services are now digitized, which raises the risk
of information being compromised by hackers,
malware, or computer viruses. In this information
technology (IT) environment, treasury officials are
increasingly being asked to justify the steps being
taken to secure and control the electronic trans-
actions and digitized data under their jurisdiction.
This article will help by describing practices and
tools available to secure modern financial pro-
cessing systems from unauthorized access.
© 2015 Wiley Periodicals, Inc.
28 The Journal of Corporate Accounting & Finance /
March/April 2015
DOI 10.1002/jcaf © 2015 Wiley Periodicals, Inc.
administration, or control of
the web environment. These
situations mean that the secu-
rity of treasury information
may be neglected.
When technical expertise is
lacking, as it is in many small
organizations, the treasurer can
take some basic steps to cre-
ate a more secure environment.
Exhibit 1 contains some funda-
mental best practices for data
security.
TOOLS AND SERVICES
Often, more comprehen-
sive solutions are needed. The
department may engage in
complex transactions that are
executed across multiple IT
environments, or cloud-based
systems may be employed.
In these situations, a third-
party consultant or software
services company should be
employed.
The list in Exhibit 2 is given
as a starting point. These com-
panies are vetted for the list as
follows:
1. The company is a major
sponsor for the informa-
tion security conference
Black Hat USA 2014.
Black Hat (www.blackhat
.com) has organized
information security
conferences in the United
States and internationally
for 16 years. It is well
known in the cybersecurity
industry for meetings and
information sharing.
2. Products for SMEs are
described on the company’s
website. This means that
the company markets prod-
ucts and services specifi-
cally for smaller organiza-
tions. The company will
likely have comprehensive
security products created
Treasurers must also be
aware of a wide variety of
cybersecurity laws and regula-
tions that cover the data being
processed. Laws such as the
Health Insurance Portability and
Accountability Act (HIPAA;
health information privacy),
Dodd-Frank (financial system
regulation), Sarbanes-Oxley
(financial reporting and internal
controls), and industry security
standards such as the Payment
Card Industry Data Security
Standard (PCI-DSS) may apply
to data generated or processed
by treasury. Privacy laws and
cybersecurity regulations cover
all sensitive data, but most affect
financial systems that use the
Internet heavily or are imple-
mented in virtual environments
(i.e., in the cloud). Compliance
issues are complex and should
be considered carefully based on
the industry and function of the
organization and the breadth of
the treasurer’s duties.
It must be mentioned that
most treasurers do not handle
these issues alone. If a company
has a dedicated IT security
staff, a good system of IT gov-
ernance, and an effective IT
audit function, the company
likely possesses the expertise
to protect financial informa-
tion assets and comply with
applicable regulations. But
many treasurers do not enjoy
the day-to-day support of sig-
nificant information security
expertise. In particular, many
small and medium sized busi-
nesses, governmental units, and
nongovernmental organizations
(NGOs) cannot afford in-house
cybersecurity specialists.
Even in larger companies
that employ security special-
ists, their time may be devoted
to other areas such as overall
enterprise security, software
change control, network
identifiers, and serial numbers.
Payment systems, another trea-
sury function in many organiza-
tions, can contain credit card
numbers, security codes, and
customer and vendor data. All
of this information is subject
to threats, such as malware and
data loss, and is affected by com-
pliance issues, such as privacy
and security laws.
Malware established in
treasury systems can quickly
compromise significant amounts
of high-value information. To
protect in-house systems and
networks, a firewall is typically
created to protect the company’s
information assets. However,
breaches can occur when unau-
thorized software (that can
contain malware) is introduced
behind the firewall. Thus, when
employees download and install
personal software, open personal
e-mail, click on e-mail attach-
ments, surf personal sites at
work, or leave applications open,
malware can be introduced and
gain a footing in the system.
Many companies are lever-
aging advanced technologies,
such as cloud computing, to
cut costs and gain competitive
advantage. Considerable strides
have been made in the security
aspects of cloud-based systems.
For example, an industry
consortium called the
Cloud Security Alliance has
organized and published
(www.cloudsecurityalliance.org)
information about the advance-
ments made in cloud-based data
security. Challenges continue to
exist particularly with respect to
sporadic episodes of data loss
and the possibility of denial-of-
service attacks. However, with a
reputable cloud-based provider
(and good firm-based enterprise
security), cloud computing can
be an effective and secure method
of processing financial data.
The Journal of Corporate Accounting & Finance / March/April
2015 29
© 2015 Wiley Periodicals, Inc. DOI 10.1002/jcaf
Fundamental Best Practices for Information Security
For in-house systems:
• Install security software that creates a firewall and
provides malware protection. Keep the profiles up to
date.
• Create a standard security configuration for browsers and e-
mail software. Establish a policy to prevent
alterations to the standard configuration.
• Establish policies concerning using and configuring other
software and installing new programs.
• For centralized accounting software, create authorization
layers and associated passwords and assign a
responsible employee to review security reports.
• Backup files frequently. Consider automating the process. If
the organization does not have a business
continuity plan, consider starting one.
For web-based financial systems and cloud-based environments:
• Analyze the data communicated over proprietary systems
or stored in cloud-based environments. Con-
sider laws and regulations that apply to the information and
ensure that you are in compliance with all
privacy and security provisions for the data being transmitted or
stored.
• In a cloud-based environment, make sure that sensitive data
are encrypted using an established and
secure algorithm and that proper controls are maintained over
the encryption keys.
For any environment:
• If you (or your firm) lack the in-house technological
expertise, contact an outside expert to conduct a
security review (see Exhibit 2 for some suggestions).
• Learn more. The Department of Homeland Security, for
example, maintains web resources that are a good
starting point for learning about cybersecurity. See
www.dhs.gov.
Exhibit 1
Companies That Can Provide Conventional and Cloud-Based
Data Security
Solution
s
Company Product and Services Site
KPMG LLP Risk management consulting services
www.kpmg.com
Mandiant Security consulting and incident response
www.mandiant.com
SecureWorks A Dell subsidiary that provides a variety of
information
security services
www.secureworks.com
Trustwave Comprehensive security, data protection, and risk
management services
www.trustwave.com
Verdasys Cloud-based security products www.verdasys.com
Watchguard Integrated information security and threat
management
solutions for small and medium-sized enterprises
(and larger organizations)
www.watchguard.com
Exhibit 2
30 The Journal of Corporate Accounting & Finance /
March/April 2015
DOI 10.1002/jcaf © 2015 Wiley Periodicals, Inc.
controls should cover three
areas:
• Prevent of data
breaches,
• Eliminate data loss, and
• Comply with cybersecurity
and privacy laws and
regulations.
traditional financial controls
over treasury department trans-
actions. Physical security of
assets, segregation of duties,
and cash controls are common
and well understood. What is
described in this article is add-
ing a set of IT and cybersecu-
rity controls to the mix. These
for and priced for that
market.
CONCLUSION
Because of the nature of
treasury operations, most orga-
nizations have a strong set of
John A. Pendley is Associate Professor of Accounting at the
Sigmund Weis School of Business at Susque-
hanna University, in Selinsgrove, Pennsylvania. He can be
reached at [email protected] .

Weitere ähnliche Inhalte

Ähnlich wie 27featurearticle© 2015 Wiley P.docx

Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security Compliance
Condition Zebra (CONZebra)
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 

Ähnlich wie 27featurearticle© 2015 Wiley P.docx (17)

Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security Compliance
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 

Mehr von lorainedeserre

4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
lorainedeserre
 
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
lorainedeserre
 
38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docx
lorainedeserre
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
lorainedeserre
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
lorainedeserre
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docx
lorainedeserre
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
lorainedeserre
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
lorainedeserre
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx
lorainedeserre
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx
lorainedeserre
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
lorainedeserre
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx
lorainedeserre
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx
lorainedeserre
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx
lorainedeserre
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx
lorainedeserre
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
lorainedeserre
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx
lorainedeserre
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
lorainedeserre
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
lorainedeserre
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
lorainedeserre
 

Mehr von lorainedeserre (20)

4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
 
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
 
38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docx
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docx
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

27featurearticle© 2015 Wiley P.docx

  • 1. 27 fea t u r e ar t i c l e © 2015 Wiley Periodicals, Inc. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI 10.1002/jcaf.22031 by the treasury function. Those challenges and some important information technology (IT) security and compliance con- siderations are presented in this article. Because smaller organiza- tions may lack the resources for full and complete cybersecurity, the article is written primarily
  • 2. for the treasurers of the small or midsized organizations. But any John A. Pendley Information Security and Cloud-Based Computing: Tools for the Corporate Treasurer C orporate treasur- ers are responsible for a great variety of activities. In addi- tion to policymaking roles, treasurers may also be responsible for certain day-to-day activities, particularly those related to cash management and investment policy. For example, some treasur- ers are responsible for the management of customer invoicing, bill payment, cash trans- fers, and securities pur- chases and sales. With such a wide breath of activities, it seems overkill to add informa- tion security to the mix. But, unfortunately, such must be the case in today’s information pro-
  • 3. cessing environment. This article describes cyber- security issues for the financial treasurer. The treasurer faces some unique challenges because of the low-volume, high-value transactions typically handled financial manager involved in treasury- related functions should have a work- ing knowledge of data security basics. ARE YOU PREPARED? Many types of data routinely handled by treasury departments are vulnerable to data loss or compromise. Cash transfers are routinely made in order to manage cash balances and ensure the availability of funds across the organizations’ functions. These transfers involve important and sensitive data, including account numbers, passwords, transaction identifiers, and routing numbers.
  • 4. Many treasurers oversee investments and manage debt. To do so requires the execution of securities transactions that involve accounts, fund This article describes cybersecurity issues for the financial treasurer. Although job descriptions for corporate treasurers probably don’t mention systems and information security, many treasury services are now digitized, which raises the risk of information being compromised by hackers, malware, or computer viruses. In this information technology (IT) environment, treasury officials are increasingly being asked to justify the steps being taken to secure and control the electronic trans- actions and digitized data under their jurisdiction. This article will help by describing practices and tools available to secure modern financial pro- cessing systems from unauthorized access. © 2015 Wiley Periodicals, Inc. 28 The Journal of Corporate Accounting & Finance / March/April 2015 DOI 10.1002/jcaf © 2015 Wiley Periodicals, Inc. administration, or control of the web environment. These situations mean that the secu- rity of treasury information may be neglected.
  • 5. When technical expertise is lacking, as it is in many small organizations, the treasurer can take some basic steps to cre- ate a more secure environment. Exhibit 1 contains some funda- mental best practices for data security. TOOLS AND SERVICES Often, more comprehen- sive solutions are needed. The department may engage in complex transactions that are executed across multiple IT environments, or cloud-based systems may be employed. In these situations, a third- party consultant or software services company should be employed. The list in Exhibit 2 is given as a starting point. These com- panies are vetted for the list as follows: 1. The company is a major sponsor for the informa- tion security conference Black Hat USA 2014. Black Hat (www.blackhat .com) has organized information security conferences in the United
  • 6. States and internationally for 16 years. It is well known in the cybersecurity industry for meetings and information sharing. 2. Products for SMEs are described on the company’s website. This means that the company markets prod- ucts and services specifi- cally for smaller organiza- tions. The company will likely have comprehensive security products created Treasurers must also be aware of a wide variety of cybersecurity laws and regula- tions that cover the data being processed. Laws such as the Health Insurance Portability and Accountability Act (HIPAA; health information privacy), Dodd-Frank (financial system regulation), Sarbanes-Oxley (financial reporting and internal controls), and industry security standards such as the Payment Card Industry Data Security Standard (PCI-DSS) may apply to data generated or processed by treasury. Privacy laws and cybersecurity regulations cover all sensitive data, but most affect financial systems that use the
  • 7. Internet heavily or are imple- mented in virtual environments (i.e., in the cloud). Compliance issues are complex and should be considered carefully based on the industry and function of the organization and the breadth of the treasurer’s duties. It must be mentioned that most treasurers do not handle these issues alone. If a company has a dedicated IT security staff, a good system of IT gov- ernance, and an effective IT audit function, the company likely possesses the expertise to protect financial informa- tion assets and comply with applicable regulations. But many treasurers do not enjoy the day-to-day support of sig- nificant information security expertise. In particular, many small and medium sized busi- nesses, governmental units, and nongovernmental organizations (NGOs) cannot afford in-house cybersecurity specialists. Even in larger companies that employ security special- ists, their time may be devoted to other areas such as overall enterprise security, software change control, network
  • 8. identifiers, and serial numbers. Payment systems, another trea- sury function in many organiza- tions, can contain credit card numbers, security codes, and customer and vendor data. All of this information is subject to threats, such as malware and data loss, and is affected by com- pliance issues, such as privacy and security laws. Malware established in treasury systems can quickly compromise significant amounts of high-value information. To protect in-house systems and networks, a firewall is typically created to protect the company’s information assets. However, breaches can occur when unau- thorized software (that can contain malware) is introduced behind the firewall. Thus, when employees download and install personal software, open personal e-mail, click on e-mail attach- ments, surf personal sites at work, or leave applications open, malware can be introduced and gain a footing in the system. Many companies are lever- aging advanced technologies, such as cloud computing, to
  • 9. cut costs and gain competitive advantage. Considerable strides have been made in the security aspects of cloud-based systems. For example, an industry consortium called the Cloud Security Alliance has organized and published (www.cloudsecurityalliance.org) information about the advance- ments made in cloud-based data security. Challenges continue to exist particularly with respect to sporadic episodes of data loss and the possibility of denial-of- service attacks. However, with a reputable cloud-based provider (and good firm-based enterprise security), cloud computing can be an effective and secure method of processing financial data. The Journal of Corporate Accounting & Finance / March/April 2015 29 © 2015 Wiley Periodicals, Inc. DOI 10.1002/jcaf Fundamental Best Practices for Information Security For in-house systems: • Install security software that creates a firewall and provides malware protection. Keep the profiles up to date.
  • 10. • Create a standard security configuration for browsers and e- mail software. Establish a policy to prevent alterations to the standard configuration. • Establish policies concerning using and configuring other software and installing new programs. • For centralized accounting software, create authorization layers and associated passwords and assign a responsible employee to review security reports. • Backup files frequently. Consider automating the process. If the organization does not have a business continuity plan, consider starting one. For web-based financial systems and cloud-based environments: • Analyze the data communicated over proprietary systems or stored in cloud-based environments. Con- sider laws and regulations that apply to the information and ensure that you are in compliance with all privacy and security provisions for the data being transmitted or stored. • In a cloud-based environment, make sure that sensitive data are encrypted using an established and secure algorithm and that proper controls are maintained over the encryption keys. For any environment: • If you (or your firm) lack the in-house technological expertise, contact an outside expert to conduct a security review (see Exhibit 2 for some suggestions).
  • 11. • Learn more. The Department of Homeland Security, for example, maintains web resources that are a good starting point for learning about cybersecurity. See www.dhs.gov. Exhibit 1 Companies That Can Provide Conventional and Cloud-Based Data Security Solution s Company Product and Services Site KPMG LLP Risk management consulting services www.kpmg.com Mandiant Security consulting and incident response www.mandiant.com SecureWorks A Dell subsidiary that provides a variety of information security services www.secureworks.com
  • 12. Trustwave Comprehensive security, data protection, and risk management services www.trustwave.com Verdasys Cloud-based security products www.verdasys.com Watchguard Integrated information security and threat management solutions for small and medium-sized enterprises (and larger organizations) www.watchguard.com Exhibit 2 30 The Journal of Corporate Accounting & Finance / March/April 2015 DOI 10.1002/jcaf © 2015 Wiley Periodicals, Inc. controls should cover three
  • 13. areas: • Prevent of data breaches, • Eliminate data loss, and • Comply with cybersecurity and privacy laws and regulations. traditional financial controls over treasury department trans- actions. Physical security of assets, segregation of duties, and cash controls are common and well understood. What is described in this article is add- ing a set of IT and cybersecu- rity controls to the mix. These for and priced for that market. CONCLUSION
  • 14. Because of the nature of treasury operations, most orga- nizations have a strong set of John A. Pendley is Associate Professor of Accounting at the Sigmund Weis School of Business at Susque- hanna University, in Selinsgrove, Pennsylvania. He can be reached at [email protected] .