{"id":2364,"date":"2005-03-08T00:00:00","date_gmt":"2005-03-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/08\/compliance-legislation-making-fraud-easier\/"},"modified":"2021-12-30T11:41:09","modified_gmt":"2021-12-30T11:41:09","slug":"compliance-legislation-making-fraud-easier","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/08\/compliance-legislation-making-fraud-easier\/","title":{"rendered":"Compliance legislation &#8216;making fraud easier&#8217;"},"content":{"rendered":"<p>The complex and copious amounts of data being stored on corporate networks post-Sarbanes-Oxley may actually be creating greater opportunities for fraud &#8212; even though the law was a reaction to the huge corporate frauds which rocked Enron and WorldCom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>And data &#8220;gluttony&#8221;, as one analyst branded it, may be setting companies up for a fall further on down the line.<\/p>\n<p>Peter Dorrington, head of fraud solutions at SAS, told ZDNet UK sister site silicon.com companies are blindly storing vast amounts of data while giving little thought to what is actually being stored.  &#8220;There is just a lot of storage going on,&#8221; said Dorrington.  &#8220;Fraudsters are reliant upon their transaction being a tree hidden a forest,&#8221; said Dorrington, adding that the vast amounts of data being stored post-SOX are simply increasing the size and density of that forest.<\/p>\n<p>James Governor, analyst at Red Monk, said: &#8220;Any company which simply stores everything is creating problems for themselves further down the line.  Storing everything is just abdicating responsibility, rather than following policy and understanding what they should be storing&#8221;.  While such policies must be adhered to they create a no-win situation in which they also conflict with the retention requirements of other regulation such as SOX, said Governor.  &#8220;Rather than just spending more and more money on storage it would make sense to invest a lot more money in working out exactly what companies need to store.&#8221;<\/p>\n<p>Shaun Fothergill, security strategist and compliance expert at Computer Associates, believes despite problems settling in, SOX will improve matters for business when implemented effectively.  Fothergill said: &#8220;Compliance and regulation is forcing the business of IT to do things right.  So organisations will begin to measure and monitor more than they did before.&#8221;<\/p>\n<p>As the anomalies and fraud issues are corrected the indicators of problems will be moved from red to amber then to green.<\/p>\n<p>Such confusion may be one reason why the SOX deadline for companies based in European countries has been put back a further year this week.  Originally the controversial section 404, which outlines the requirement to archive data, was to come into effect on 15 July 2005.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/business\/legal\/0,39020651,39190561,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2364","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2364"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2364\/revisions"}],"predecessor-version":[{"id":4851,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2364\/revisions\/4851"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}