Pitmans, one of the most reputable legal firms in Europe have dedicated departments which specialise in defamation cases, cyber law, data and privacy laws and much more. On February 7th 2013 they hosted their Annual Cyber Security conference. The conference, increasing in popularity each year, covers many facets of information security, reputation management, privacy issues and a look into the solutions available to protect your company or brand online.
This year, Massive was excited to attend, gaining further insight into the corporate response system for security breaches and reputation management.
There were several points of interest brought up at the conference.
Information Sharing & Security
Technology and procedures exist to give close to 100% security for your business online. Whether you have had consumer information leaked, have been hacked or breached in some way, you can still be protected.
We have seen it with Twitter, LinkedIn, NHS and many other large companies. Information about their users or consumers are leaked through malicious hacking and exposure.
Data sharing technology has been increasing at an exponential rate, but security has not been increased with the same energy. This has put brands in a risky position.
At the conference we saw keynote speakers discuss new technology to secure brands from penetration and provide accurate risk assessments and resolve weaknesses. Company representatives of note were Digital Shadows, who provide one of the most in-depth brand monitoring softwares available. Assuria, who’s technology for internal monitoring and tracing for intrusions and activity surpass anything we have seen before.
It became apparent that these security procedures and response task forces which resolve these matters are spread over too many firms, when the real solution to security issues and brand reputation would require a merge of each firm and their unique skill set.
What is need to be totally protected:
Internal monitoring software which logs every trace of usage of your internal systems. This would catch foul play from unscrupulous employees, mistakes, external intrusions (hacking) and tell the administrator of anything out of the norm.
External monitoring software. What if you bit the problem in the rear before it hit the media? With this software you could watch, log and be alerted to almost any mention of your brand or selected phrases, keywords etc relating to the area you want to control. This mean, if someone talks about you on some remote forum, you catch it immediately and can take the necessary action based on the scenario.
Rapid response team. Let’s say you had a data breach on your system. This rapid response team (combined with the above tools) would be able to detect and trace the issue to its source very fast. You would then know if you needed to get police involved, further investigation or public relations and reputation management.
Reputation management for the fallout. See the PR disaster with LinkedIn last year? How about the NHS losing millions of patients’ records? Reputation management could only truly be accomplished (with good results) if the above points 1-3 were active prior to the situation. Without this it would just be damage control to the best of your firm’s ability.
The key to resolving fallout of a security breach is speed and the ability to locate the truth of the situation fast.
What is needed is a merge of all the above into one solid service. And guess who will be doing that? Massive.