Is your enterprise following the rules?
The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Companies that must comply with SOX are U.S. public companies, foreign filers in U.S. markets and privately held companies with public debt. Ultimately, the corporate CEO and CFO are accountable for SOX compliance, and they will depend on company finance operations and IT to provide critical support when as they report on the effectiveness of internal control over financial reporting.
Sound practices include corporate-wide information security policies and enforced implementation of those policies for employees at all levels. Information security policies should govern network security, access controls, authentication, encryption, logging, monitoring and alerting, pre-planned coordinated incident response, and forensics. These components allow for information integrity and data retention, while enabling IT audits and business continuity.
Complying with Sarbanes-Oxley
The changes required to ensure SOX compliance reach across nearly all areas of a corporation. In fact, Gartner Research went so far as to call the Act "the most sweeping legislation to affect publicly traded companies since the reforms during the Great Depression." Since the bulk of information in most companies is created, stored, transmitted and maintained electronically, one could logically conclude that IT shoulders the lion's share of the responsibility for SOX compliance. Enterprise IT departments are responsible for ensuring that corporate-wide information security policies are in place for employees at all levels. Information security policies should govern:
* Network security
* Access controls
* Authentication
* Encryption
* Logging
* Monitoring and alerting
* Pre-planning coordinated incident response
* Forensics
These components enable information integrity and data retention, while enabling IT audits and business continuity.
In order to comply with Sarbanes-Oxley, companies must be able to show conclusively that:
* They have reviewed quarterly and annual financial reports;
* The information is complete and accurate;
* Effective disclosure controls and procedures are in place and maintained to ensure that material information about the company is made known to them.
Sarbanes-Oxley Section 404
Section 404 regulates enforcement of internal controls, requiring management to show that it has established an effective internal control structure and procedures for accurate and complete financial reporting. In addition, the company must produce documented evidence of an annual assessment of the internal control structure's effectiveness, validated by a registered public accounting firm. By instituting effective email controls, organizations are not only ensuring compliance with Sarbanes-Oxley Section 404; they are also taking a giant step in the right direction with regards to overall email security.
Effective Email Controls
Email has evolved into a business-critical application unlike any other. Unfortunately, it is also one of the most exposed areas of a technology infrastructure. Enterprises must install a solution that actively enforces policy, stops offending mail both inbound and outbound and halts threats before internal controls are compromised, as opposed to passively noting violations as they occur.
An effective email security solution must address all aspects of controlling access to electronically stored company financial information. This includes access during transport as well as access to static information resident at the company or on a remote site or machine. Given the wide functionality of email, as well as the broad spectrum of threats that face email systems, ensuring appropriate information access control for all of these points requires:
* A capable policy enforcement mechanism to set rules in accordance with each company's systems of internal controls;
* Encryption capabilities to ensure privacy and confidentiality through secure and authenticated transport and delivery of email messages;
* Secure remote access to enable remote access for authorized users while preventing access from unauthorized users;
* Anti-spam and anti-phishing technology to prevent malicious code from entering a machine and to prevent private information from being provided to unauthorized parties
In conclusion, complying with Sarbanes-Oxley puts a heavy burden on an organization's IT department to implement and enforce policies set up by corporate governance boards. In order to make sure the company's email system complies with Sarbanes-Oxley, IT managers must be able to document steps they have taken to address Section 404 of the code. CipherTrust manufactures a secure email gateway appliance that can help organizations comply with Sarbanes-Oxley. To learn more about it, please visit www.ciphertrust.com/solutions/compliance_SOX.php and read our articles and white paper on the subject of SOX compliance.
Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security and anti spam solutions. Learn what you need to know to comply with Sarbanes-Oxley regulations by visiting http://www.ciphertrust.com/solutions/compliance_SOX.php today.
![]() |
|
![]() |
|
![]() |
|
![]() |
The 1998 Data Protection Act was not an extension to,... Read More
In 1997, I decided after 15 years as a practicing... Read More
When we think of adware, what comes to mind are... Read More
First of all we need to get some terms stated.... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
As soon as almost all computer users already got used... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Whether we like it or not, we are all living... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
There you are busily typing away on your PC or... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Business on the internet is getting down right shameless. This... Read More
The Message Must Get Through The year is 300A.D.,... Read More
This really chapped my lips...I recently bought a new computer.... Read More
My first experience with a spyware BHO based infection was... Read More
This is not some new fangled techno-speak, it is a... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
You've seen it in the news - 40 million credit... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
When it comes to a secure website and passwords it... Read More
Phishing is the act of some individual sending an email... Read More
A little bit of time invested into learning about internet... Read More
So called phishers try to catch the information about the... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Only the top spyware removers are successful at detecting and... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
During the release of a new software product specialized to... Read More
Computer infections can be broken up into 4 main categories... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
What is computer security? Computer security is the process of... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Ok, you've got a computer, and you get online. You... Read More
Every now and then you can read about a new... Read More
First, let's do a little recap'. As I stated in... Read More
If you use the internet, you have probably been infected... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
You can detect spyware online using free spyware cleaners and... Read More
First off I should explain what phishing is. Phishing is... Read More
If you are wondering how to fight spyware for safe... Read More
Do you sometimes notice your computer running slower. Is your... Read More
When it comes to a secure website and passwords it... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
By browsing a web page, you could infect your computer... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
A week or so ago, I received an inquiry from... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Millions of people make purchases online, but many people are... Read More
The average computer is packed with hidden software that can... Read More
There are several basic concepts to keep in mind when... Read More
If you run any type of Internet business, Adware and... Read More
It has been said that with the wealth of information,... Read More
At this point, if you've got the whole "turning the... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Well, if that would have been said to me by... Read More
Have you ever got an email asking you to confirm... Read More
As more people are logging onto the Internet everyday, Network... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
If you know what is the 'Fishing' then it's very... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Ebay is a great site and is used by many... Read More
Internet Security |