Securing your online capital
Jeremy Berwick and Patrick O'Kane examine public key encryption and assess how firms should best protect their information assets
Last week I travelled to Ireland to collect a car. I took a flight from Luton to Dublin which cost me £35, and I reserved a high speed ferry from Dublin to Holyhead. The night before my trip I remembered I did not have the foggiest idea of how to get from my Winchester home to Luton. Within a couple of minutes I had a full printout of train times via or avoiding London to Luton. On the day of my journey the postman delivered a book I had ordered a week earlier which had been delivered from the US.If you have not guessed by now all of these transactions were conducted over the Internet. The airline tickets were purchased via Expedia; ferry tickets with Irish Ferries; train times from Railtrack; and the book from amazon.com.I was able to arrange my journey at night, outside ‘office hours’. The Internet is just starting to liberate my time in a way I imagine the car did for many when it first hit the streets.Many factors have swung me around to using the Internet as a purchasing medium, including: its convenience; the bargains you can find; the hype; the incredible amount of information available to help you with purchases; and the personalised nature of sites. But by far the most influential factor has been my perception of improvements in information security (info sec) technologies, which protect my credit card details while they are being transmitted. The first use of my credit card over the Internet was like being told it is OK to jump out of a burning aircraft because you are wearing a parachute. You would prefer not to jump, but it is necessary if you want to survive. And so it is with using the Internet. Business-to-business and business-to-consumer transactions are accelerating at an unprecedented rate. All of these are fuelled by the promise of substantial cost savings, the ease of managing supply chains and distribution channels, the leverage the Internet can provide – particularly in the service industries (such as banking and insurance) – and the new-found trust we seem to be quickly acquiring.But how do you decide which information assets you need to protect? What technologies exist to protect your information assets and what are the common issues that arise when installing information security solutions?
This premium content is reserved for
Legal Week Subscribers.
Subscribe today and get 10% off.
A PREMIUM SUBSCRIPTION PROVIDES:
- Trusted insight, news and analysis from the UK and across the globe
- Connections to senior business lawyers within the leading law firms and legal departments
- Unique access to ALM's unrivalled, market-leading reporting in the US and Asia and cutting-edge research, including Legal Week's UK Top 50 and Global 100 rankings
- The Legal Week Daily News Alert, Editor's Highlights, and Breaking News digital newsletters and more, plus a choice of over 70 ALM newsletters
- Optimized access on all of your devices: desktop, tablet and mobile
- Complete access to the site's full archive of more than 56,000 articles
Already have an account? Sign In Now
For enterprise-wide or corporate enquiries, please contact Paul Reeves on Preeves@alm.com or call on +44 (0) 203 875 0651