An estimated 60% of all cyberattacks originate from inside the organization that’s attacked.1 It’s a sobering figure that all IT managers need to keep in mind. But what can you do to prevent people inside the company from causing problems? One solution is to make sure your separation of duties (SoD) policies are well designed.
SoD is a business practice that seeks to prevent any one employee from having the power to steal from the company or otherwise disrupt operations without anyone else noticing. The practice is common in financial companies and accounting departments, where monetary theft is a concern. With cybersecurity becoming as important as financial security, SoD is increasingly common in IT departments as well.
If you’re an IT manager, or aspiring to an information technology management career, you need to know how to make sure data administrators, computer programmers, system analysts, system administrators, data analysts, the chief operations officer, and every other employee with access to your systems can’t steal data or disrupt the system undetected. It’s such a vital part of cybersecurity that Walden University students in both the MS in Information Technology and the Master of Information Systems Management programs study the importance of SoD.
In the IT degree course Computer Law, Crime, and Investigation, Walden students explore the CSO online article “Separation of Duties and IT Security.”2 In the article, writers Alyson Behr and Kevin Coleman point out that, in addition to the cybersecurity advantages of good SoD, U.S. laws such as the Sarbanes-Oxley (SOX) and Gramm-Leach-Bliley Act (GLBA) and a new regulatory mandate from the European Union’s General Data Protection Regulation require companies to take certain SoD measures, like conducting regular information security audits.
But following government regulation is just a starting point for anyone who wants strong SoD. In addition to adhering to what governments demand, Behr and Coleman recommend implementing four important SoD practices that can improve your information security:
In addition to courses on IT law and cybersecurity, good IT master’s programs offer a wide range of other courses designed to advance your IT knowledge and prepare you for IT jobs. Depending on your career goals, either an MS in Information Technology or a Master of Information Systems Management (MISM) can be the right IT degree for you.
In a master’s in information technology program, you can develop essential programming, networking, and database management and development skills. You can also specialize in areas such as big data analytics, health informatics, information assurance and cybersecurity, information systems, and software engineering. In a MISM degree program, you can learn how to evaluate and allocate IT resources effectively, design and manage systems to meet key organizational objectives, and lead IT initiatives and teams across functional areas in diverse organizations.
But no matter which information technology degree program you choose, you can make earning your master’s degree more possible by choosing online education. When you earn an MS in Information Technology degree online or an information systems management degree online, you can complete your coursework from home or anywhere else you have internet access. Plus, the online learning format will let you choose when in the day you attend class, giving you the flexibility to work full time while you earn your degree.
Walden University is an accredited institution offering Master of Information Systems Management and MS in Information Technology degree programs online. Expand your career options and earn your degree in a convenient, flexible format that fits your busy life.
Walden University is accredited by The Higher Learning Commission, www.hlcommission.org.