Board Portal Security: Safeguarding the Organisation

Board Portal Security: Safeguarding the Organisation

With the prevalence of online threats and attacks on corporate entities of all kinds and sizes, cybersecurity is an area that cannot be simply relegated to the I.T. departments of organisations to handle.

Securing the corporation is an essential component of sound business strategy that is developed, refined, and shaped by c-suite leaders and boards of directors.

Security is not solely an information technology concern, it is a risk management issue for the organisation.

Placed in this context, these questions arise:

What does this mean for the Board?

What are some of the responsibilities of the Board to ensure the security of the corporation?

How does securing board-related activities impact the overall security of the organisation?

How might board meeting software or, board portals, help?

Securing the Organisation

1.) Legal Obligation to Exercise Fiduciary Duty of Care

All members of the board are bound by a legal obligation to act in good faith for the business. The fiduciary duty of care requires that directors exercise competence, diligence, and prudence when supporting – or furthering – the organisation’s objectives. The board is also expected to make well-informed decisions that serve the collective benefit of the corporation and its shareholders.

This fiduciary duty of care applies to cyber-risk strategy and oversight as well.

Individual directors are increasingly being held accountable for cybersecurity incidents.

For instance, the Yahoo! and Equifax data breaches led to a number of class-action lawsuits that sought to impose direct liability on directors for, among others, a breach of duty of care specific to the board’s oversight on data security.

Directors, therefore, cannot afford to overlook the issue of cybersecurity. To do so would not only subject the organisation to vulnerabilities, but they also expose themselves to legal liabilities for their failure to fulfil their duties as board members.

2.) Comply with Security Regulations

The board needs to ensure that it complies with data protection and privacy regulations set by various regulatory bodies so as to prevent the organisation from suffering hefty financial fines that can severely impact the bottom-line.

To cite an example: in May 2018, the European Union’s General Data Protection Regulation (GDPR) took effect. The GDPR is the most important change in data privacy and regulation for business entities that conduct business in the EU. Organisations can be fined up to 4% of annual global turnover for breaching GDPR or €20 Million (whichever amount is higher).

The board needs to stay on top of shifting and evolving security regulations and laws – as a matter of compliance and good governance.

3.) Minimise Potential Impact on Tangible and Intangible Assets

For some boards, securing the organisation has yet to be deemed as a critical area of concern. But when security doesn’t rank as high in the order of priorities as do other components of strategy (i.e. financial, operational, compliance, etc.), the entire organisation can be compromised. Tangible and intangible assets of the corporation can be severely impacted by security lapses and lead to the erosion of shareholder value. This should be a concern for every board.

Assets at Risk

1.) Finances

Security breaches can be so significant as to change the narrative of a company’s performance and valuation. When FedEx was subjected to a cyber-attack in 2017, it cost the company USD $400 million – impacting its 2018 fiscal forecast by more than USD $1.00 per share from what was initially predicted prior to the attack.

The financial setbacks were also reflected in a decline in operating income and margin in the first half of the succeeding fiscal year, largely due to the costs of the incident (i.e. recovery and remediation) along with lower volume business.

2.) Reputation

The potential loss of customer and stakeholder trust may be difficult to regain after a data breach. Customer acquisition costs might jump significantly, and retaining existing customers may turn out to be a challenge since faith and goodwill in the company have diminished.

While that has a direct impact on the business, the indirect consequences are worth noting as well – such as the inability to attract investors, acquire top-notch talent, and work with qualified partners.

3.) Intellectual Property and Competitive Advantage

An attack on Forrester Research allowed hackers to acquire research content that was available only to its paying customers. Although the hack was contained, it highlights the fact that cybersecurity incidents are not confined to the disruption of production systems.

In other cases, losing proprietary information and intellectual property can have a crippling effect on an organisation’s competitive advantage especially if trade secrets are compromised and subsequently divulged, shared, or applied.

Securing the Boardroom

It’s important to consider that board members can create cybersecurity risks for the organisation. Therefore, security systems and protocols should be applied at this level. Directors have access to – and share amongst themselves – highly-sensitive, valuable, and strategic information.

It would be no surprise if board members are prime targets for cybercriminals. This is especially true in light of the COVID-19 pandemic.

Board Security and COVID-19

Boards have had to resort to remote meetings and online-based activities in order to execute their governance duties. This has drastically changed the landscape of cyber-risk management for directors, and should, in itself, compel the board to act swiftly on matters of security and risk management. The stakes are higher than ever.

[NOTE: Our security presentation on remote working delves into the reasons why it should take up room in the board’s agenda. It’s a sobering discussion on the security implications of remote working for any type of organisation. Download it here.]

In the following section, we take a look at how securing board-related activities, in these unprecedented times, impacts the overall security of organisations. We detail how the use of board portal software can (and should) aid in the thwarting of cybersecurity threats.

How Board Management Software Helps

Board management software, such as Boardlogic, help mitigate the security risk around the physical loss of documents, hacking, phishing, and other targeted attacks that seek to obtain and make use of sensitive organisational board information.

Premium board portals invest in security technologies and adhere to rigorous global quality standards precisely because they have identified what’s at stake for the business.

For organisations that are keen on adopting a cultural mindset that factors in security, the use of a board portal assures stakeholders of the business that the board functions and operates in such a manner that is aligned with the organisation’s overall appetite for risk management.

Here are some of the features or properties that secure board portals have and how they help protect the organisation:

a.) Secure-by-Design

Security cannot be an afterthought in the development of applications, especially board portals. The most secure solutions integrate security measures, protocols, and considerations throughout the development process – making board-related information less susceptible to data breaches and cyber-attacks.

b.) Data Encryption

File and data encryption ensures that board information remains private and secure even if it lands in the wrong hands. Secure board portals have robust encryption methodologies to preserve the integrity and confidentiality of data. Files are protected by access controls and users’ unique decryption keys.

c.) Custom-Permission (or “Granular”) Settings

The most secure board portals are able to apply custom-permission settings for its users. This means that directors are granted appropriate rights to view, edit, or delete documents and/or files. Board information can also be disseminated only to specific individuals (or groups) depending on their roles, the situation, and existing board structure.

For example, if a director belongs to the audit committee, he or she can access all audit-related material but may not be able to access the data assigned to members of the compensation committee (unless, of course, they were given specific rights or permissions). Custom-permission settings affords directors the flexibility to control security on a granular level. This addresses issues of confidentiality and of compliance.

d.) In-app Mail/Messaging Functionality

E-mail is not a closed-loop system. Emails can be easily sent to unintended recipients. One of the highlights of board portals is their in-app mail/messaging functionality – which can substitute for email communications between members. It does away with the multitude of risks associated with emailing and “closes the loop” because messaging is confined to members of the board portal, e.g. directors and/or portal administrators.

e.) ISO 27001 Certified

A cloud-based or SaaS board portal provider that is ISO 27001 certified meets the global security standard for managing the security of the information it holds – including data assets entrusted to the organisation, i.e. board-related information.

Boards who utilise board portals that are ISO 27001 certified can rest assured that they are partnering with a provider who has the infrastructure, systems, and policies to ensure the security of their data.

Conclusion

As a final note, the organisation’s commitment to security begins at the top.

For the business to instil in its workforce the value and importance of securing the organisation as part of its core corporate strategy in an era of risk and uncertainty, leaders must set the tone for it. Boards have an obligation to cybersecurity and this ought to begin in the boardroom.

Securing board-related information not only exhibits a proactive stance towards cybersecurity issues, but it is also reflective of a thoughtful, prudent approach to effective risk management – which, ultimately, is a step in the direction of good governance.