Are our information systems secure enough? | The Business Standard
Skip to main content
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Thursday
July 03, 2025

Sign In
Subscribe
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
THURSDAY, JULY 03, 2025
Are our information systems secure enough?

Thoughts

Mamun Rashid
20 December, 2024, 06:50 pm
Last modified: 20 December, 2024, 06:55 pm

Related News

  • Govt issues gazette of Cyber Security Ordinance
  • Public notice issued seeking information on BDR carnage
  • Gazette on 'Cyber Safety Ordinance' end of this month: Faiz
  • Nation-state cyber attacks: Are you at risk?
  • Bangladesh's new digital laws under scrutiny

Are our information systems secure enough?

Phishing attacks, ransomware, and data breaches are becoming increasingly common. Organisations must adopt robust measures to protect their data and systems from unauthorised access

Mamun Rashid
20 December, 2024, 06:50 pm
Last modified: 20 December, 2024, 06:55 pm
Illustration: TBS
Illustration: TBS

The recent surge in cyberattacks globally, coupled with increasing digitalisation in Bangladesh, has magnified the vulnerabilities within our cyber ecosystem. Cyber threats are evolving at an alarming rate, becoming more sophisticated and harder to detect. 

We know of a central bank money heist. Reputed media operators also reported on an IT firewall break. Apart from that, many of our public undertakings have also reported repeated cyberattacks or hacking. 

In the same vein, phishing attacks, ransomware, and data breaches are becoming increasingly common, affecting both individuals and organisations. Organisations must adopt robust measures to protect their data and systems from unauthorised access, misuse, and potential breaches. 

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

An effective information security management system is the backbone of any organisation's information security strategy. It encompasses various activities to safeguard information assets, including software, hardware, services, data, staff, and intangible assets. 

Identifying and classifying assets is crucial. Assets are categorised based on their importance and the impact their loss or compromise would have on the organisation. This includes software, hardware, services, data, and personnel assets. Proper asset management ensures that all assets are protected according to their classification. Implementing strong access controls is essential to prevent unauthorised access to sensitive information. 

This includes role-based access, secure log-in procedures, password management systems, and session timeouts. Access to information should be granted based on the principle of least privilege, ensuring that individuals only have access to the information necessary for their role.

A robust incident management process is vital for identifying, reporting, and responding to security incidents. This includes having a dedicated team to handle incidents, conducting root cause analysis, and implementing corrective actions to prevent recurrence. 

Regular reporting and review of incidents help in the continuous improvement of the security posture. Secure coding practices and effective management of the application development lifecycle are critical to preventing vulnerabilities. Regular security testing, including vulnerability assessments and penetration testing, helps identify and mitigate potential threats.

Employees are the first line of defence in information security. Comprehensive training and awareness programs ensure that staff are knowledgeable about security policies and practices. Background checks, security training, and adherence to the code of conduct are essential components of human resource security. 

Regular audits and compliance checks are necessary to ensure that the Information Security Management System is effective and aligned with industry standards. 

For instance, ISO/IEC 27001:2013 provides a framework for managing information security. Internal and external audits help identify gaps and areas for improvement, ensuring that the organisation remains compliant with regulatory requirements.

Business continuity and disaster recovery plans are essential to ensure that operations can continue in the event of a disruption. This includes having redundant systems, regular testing of recovery procedures, and continuous monitoring to address emerging risks. An ISO 22301 certification, for example, demonstrates an organisation's commitment to maintaining business continuity.

 Bangladesh faces significant challenges in access to affordable information due to inadequate infrastructure and a lack of appropriate education. The absence of an integrated computer security system and education on cybersecurity compounds these issues. Cooperation, collaboration, and investment in cybersecurity are crucial to developing a culture of security and trust. 

Despite improvements, many organisations still use outdated security protocols, especially SMEs, which are highly vulnerable due to limited resources and awareness. The absence of a comprehensive national cybersecurity strategy exacerbates these vulnerabilities, leaving critical sectors like banking, healthcare, and telecommunications exposed to cyber threats.

Bangladesh has implemented several key policies to advance its ICT sector, including the 'National Information and Communication Technology (ICT) Policy 2018,' 'National Digital Commerce Policy 2018,' 'Cyber Security Act, 2023,' and the 'Electronic Transaction Act.'.  

These initiatives aim to develop a comprehensive ICT infrastructure across the country, ensuring that all citizens have access to information, which in turn fosters empowerment, good governance, and sustainable economic growth. The BTRC has issued various guidelines and directives to enhance cybersecurity in the telecommunications sector. 

This includes requirements for telecom operators to implement robust security measures and report cyber incidents. The Data Protection Act 2023 sets out guidelines and best practices for both organisations and the government on managing personal data. It governs how personal data is processed and ensures the protection of individuals' rights concerning their personal information.

While no system can be entirely impervious to threats, a comprehensive and proactive approach to information security can significantly mitigate risks and enhance the overall security posture of an organisation.  By adhering to established standards and continuously improving their security measures, organisations can ensure that their information systems remain secure in an ever-evolving threat landscape.


Mamun Rashid is the chairman of Financial Excellence Ltd and Founding Managing Partner of PwC Bangladesh.


Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the opinions and views of The Business Standard.

Cyber Security / Information

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • Photo: Collected
    Court orders seizure of S Alam Group’s assets over Tk10,280cr defaulted loan
  • National Consensus Commission holds meeting on 3 July 2025. Photo: Focus Bangla
    Presidential pardon, judiciary decentralisation, state of emergency top agenda on ninth day of Consensus Commission talks
  • BNP holds emergency meeting on 3 July 2025. Photo: TBS
    BNP expresses concern over hastiness in forming new telecom policy

MOST VIEWED

  • Chief adviser’s Special Envoy for International Affairs and Adviser Lutfey Siddiqi
    Fake documents submission behind visa complications for Bangladeshis: Lutfey Siddiqi
  • Electric power transmission pylon miniatures and Adani Green Energy logo are seen in this illustration taken, on 9 December 2022. Photo: Reuters
    Bangladesh clears all dues to Adani Power
  • A file photo of the NBR Bhaban in Agargaon, Dhaka
    NBR officers gripped by fear as govt gets tough  
  • Controversial taxman Matiur’s rulings cost govt Tk1000cr in lost revenue
    Controversial taxman Matiur’s rulings cost govt Tk1000cr in lost revenue
  • History in women's football: Bangladesh qualify for Asian Cup for the first time
    History in women's football: Bangladesh qualify for Asian Cup for the first time
  • NBR Office in Dhaka. File Photo: Collected
    Govt sends 4 senior NBR officials on forced retirement

Related News

  • Govt issues gazette of Cyber Security Ordinance
  • Public notice issued seeking information on BDR carnage
  • Gazette on 'Cyber Safety Ordinance' end of this month: Faiz
  • Nation-state cyber attacks: Are you at risk?
  • Bangladesh's new digital laws under scrutiny

Features

Illustration: TBS

The buildup to July Uprising: From a simple anti-quota movement to a wildfire against autocracy

15h | Panorama
Illustration: TBS

Ulan Daspara: Remnants of a fishing village in Dhaka

2d | Panorama
Photo: Collected

Innovative storage accessories you’ll love

3d | Brands
Two competitors in this segment — one a flashy newcomer, the other a hybrid veteran — are going head-to-head: the GAC GS3 Emzoom and the Toyota CH-R. PHOTOS: Nafirul Haq (GAC Emzoom) and Akif Hamid (Toyota CH-R)

GAC Emzoom vs Toyota CH-R: The battle of tech vs trust

3d | Wheels

More Videos from TBS

US signs trade deal with Vietnam

US signs trade deal with Vietnam

1h | TBS World
Will Syria normalise relations with Israel?

Will Syria normalise relations with Israel?

14h | Others
Multinational companies' participation in the Israeli massacre in Gaza

Multinational companies' participation in the Israeli massacre in Gaza

15h | Others
July fighter Fahim doesn't want to be a burden.

July fighter Fahim doesn't want to be a burden.

16h | TBS Stories
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net