Information Risk Assessments:  7 Steps to Data Safety

Information risk assessment

Written by Jackie Bilodeau

I am the Communications Director for CGNET, having returned to CGNET in 2018 after a 10-year stint in the 1990's. I enjoy hiking, music, dance, photography, writing and travel. Read more about my work at CGNET here.

February 3, 2022

In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks are at an all-time high; major ransomware stories are in the news just about every week. Do you know how safe your organization’s data really is? If you do not, then it’s past time to find out. Conducting an information risk assessment is the answer.

There are several benefits to conducting an assessment:

  • Avoid breaches, thereby reducing (or preventing altogether) both financial, operational and reputational costs from security incidents. (Want an idea of how really bad these can be? Check this out.)
  • A solid cybersecurity program is a crucial part of the foundation of successful businesses today. An assessment will provide evidence to upper management and/or board that establishes the need for this program.
  • Regulatory compliance (e.g., NIST, HIPAA, GDPR)

Before you get started

Here are a few questions to think about before beginning the process:

  1. What are our organization’s critical IT assets? In other words, what is the data whose loss or exposure would have a major impact on business operations?
  2. Which parts of your organization use or require that data?
  3. What types of threats would affect the ability of those parts of the organization to function?

7 steps to an information risk assessment

While every organization is different and faces its own unique set of risks and challenges, following is some general guidance to conducting your own assessment.

Step 1: Set up your team

Put together an interdepartmental Risk Management Team for identifying risks, communicating to employees, and conducting incident responses more effectively and efficiently. Beyond members of your IT Department, other people that should be included in your assessment team are the following:

  • Someone from senior management, for oversight
  • A person who handles or represents Human Resources, to provide insight into employee’s personally identifiable information
  • Managers or representatives from each of your major business or service departments, to make sure all critical data is available for review

Step 2: Catalogue and prioritize all information assets

Work with your team to compile a detailed list of your organization’s information assets. This means your IT infrastructure and also any Software-as-a-Service, Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (Iaas) solutions you utilize.  You should include the assets of all third-party vendors and suppliers in your catalogue, as third-party vendors can also pose a significant data breach risk.

First compile a thorough list of assets by answering the following:

  • What kinds of information is being collected by each department?
  • Where is the information being sent?
  • Where are they getting the information (where is it coming from)?
  • What vendors are being used, and what is their level of access?
  • Physically, were is information stored
  • Which devices do employees use?
  • How do remote workers access information?
  • What networks, databases and servers are used in the collection, transmission and storage of information?

Next, prioritize these assets from most to least valuable. Value can be thought of in terms of monetary value, legal value (including employee and customer/client privacy), reputational value and overall importance to the functioning of the organization.

Step 3: Identify risks

Now that you’ve identified your assets, it’s time to look at the risks to them. Common threats to data safety include unauthorized access (either maliciously or accidental); misuse of information or privilege by an authorized person; data leakage and exposure of information (again, either with malicious intent or by accident); data loss; and disruption of service or productivity.

Step 4: Consider controls

Think about the controls that your organization has in place to help minimize or prevent your data from exploitation. For example, do you use encryption for sensitive data being transmitted? Does your staff use MFA to access information? Do you have security policies in place with incidence response plans in the event there is a data breach or other threat to your information?

Step 5: Analyze Risks

While maybe not the most time-consuming, this can be the most complicated part of any risk assessment. But obviously it is also the most valuable, as it will result in a prioritized list of risks for you to act on. There is more than one way to do this, but both methods factor in the probability (likelihood) that a security incident may occur to a particular risk, and then the impact (consequences) that incident would have on the organization.

Method 1: Scoring

First, you need to come up with a score for the probability, or likelihood that a particular risk will be the target of cybercrime.  Then, create a score based on the level of impact that such an incident would have on your organization.  Finally, multiply the probability score by the impact score and you have your overall score, which you can now use to prioritize all of your risks.

Method 2: Categorizing

First, categorize the likelihood of each threat in simple levels like high/medium/low, or in more specific, graduated variations of each. Next, categorize the potential consequences the same way. Plot each risk on a matrix, like the one below. Now you can assemble a prioritized lists of which risks to address first, from those that have the highest likelihood of happening and  present the most severe impact on down.

risk matrix

 

 

Step 6: Develop a roadmap for improvements

Using the results from your scored list or matrix, you can now come up with your prioritized roadmap for defining and implementing security controls. Security controls help you manage your risks by reducing the likelihood of their occurrence or eliminating them altogether. Some examples of controls include:

  • Encryption
  • Network segregation
  • Firewall configuration
  • Password and multi-factor authentication policies
  • Anti-phishing/malware/ransomware software
  • Cybersecurity awareness training for staff

Step 7: Monitor, Review and Adjust regularly

Doing the risk assessment and setting up security controls is an excellent, necessary step toward protecting your organization’s information assets. However, the world of cybercrime is relentlessly evolving. Malicious actors are constantly changing their techniques to find ways to work around your controls. For that reason, it is critical that you regularly monitor and review your IT environment. Penetration testing and regular audits are a part of the equation, but assessment using the steps above needs to be a regular occurrence. Therefore, maintaining a risk management program and team is key to mitigating attacks.

Get the ball rolling!

So there you have it. Some organizations may see this as a daunting, time-consuming process. Or perhaps you think you don’t have enough or the right type of personnel to pull this off on your own. We’re here to help! If you would like more specific guidance on the process, please reach out us either through the comments section, or by sending your questions to info@cgnet.com.

 

 

Written by Jackie Bilodeau

I am the Communications Director for CGNET, having returned to CGNET in 2018 after a 10-year stint in the 1990's. I enjoy hiking, music, dance, photography, writing and travel. Read more about my work at CGNET here.

You May Also Like…

Demystifying the Dark Web

Demystifying the Dark Web

The Dark Web. A virtual space with an ominous-sounding label. In my mind, it has always been a cryptic, shadowy place...

You May Also Like…

Demystifying the Dark Web

Demystifying the Dark Web

The Dark Web. A virtual space with an ominous-sounding label. In my mind, it has always been a cryptic, shadowy place...

0 Comments

Translate »
Share This
Subscribe