Subject category:
Knowledge, Information and Communication Systems Management
Published by:
Wits Business School - University of the Witwatersrand
Length: 13 pages
Data source: Field research
Abstract
William Wilsnagh, Business Unit Director of Technology Services at NamITech, reflected on a rather alarming incident that had just occurred at one of NamITech''s clients. A virus had hit the the client''s network, resulting in downtime of a full day. The virus was still lurking, although NamITech had got the system back up and running. NamITech had won this client a year previously, in November 2002, after a year-long tender process. In addressing the virus attack, NamITech had fulfilled all of its responsibilities as specified in its service level agreement and the client''s IS (information systems) security had improved greatly. But, for Wilsnagh, the incident highlighted the need to extend the scope of NamITech''s services. Information systems security was all about ensuring the confidentiality, integrity and availability of information. Although viruses were the high-profile enemies in the IS security war, he knew that there was more to it than virus detection, prevention and elimination. He just needed to apply his mind to identifying potential risks and ways of addressing them.
About
Abstract
William Wilsnagh, Business Unit Director of Technology Services at NamITech, reflected on a rather alarming incident that had just occurred at one of NamITech''s clients. A virus had hit the the client''s network, resulting in downtime of a full day. The virus was still lurking, although NamITech had got the system back up and running. NamITech had won this client a year previously, in November 2002, after a year-long tender process. In addressing the virus attack, NamITech had fulfilled all of its responsibilities as specified in its service level agreement and the client''s IS (information systems) security had improved greatly. But, for Wilsnagh, the incident highlighted the need to extend the scope of NamITech''s services. Information systems security was all about ensuring the confidentiality, integrity and availability of information. Although viruses were the high-profile enemies in the IS security war, he knew that there was more to it than virus detection, prevention and elimination. He just needed to apply his mind to identifying potential risks and ways of addressing them.
