18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

288 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

10.1. Internet Security (E-Security) Critical<br />

for <strong>B2B</strong>i<br />

The Internet has revolutionized the ways in which companies do business.<br />

<strong>B2B</strong> e-<strong>commerce</strong> is undeniably efficient, inexpensive and flexible. However,<br />

it is vulnerable <strong>to</strong> a range of security risks. As <strong>B2B</strong> e-<strong>commerce</strong><br />

becomes more widespread, security tends <strong>to</strong> be critical in achieving<br />

seamless communications between trading partners. It is not just a<br />

requirement, but in fact the foundation on which <strong>B2B</strong>i will be built.<br />

Information recorded electronically and available on networked<br />

computers is more risk-prone than if the same information is printed on<br />

paper and locked in a filing cabinet. Intruders do not need <strong>to</strong> be<br />

physically present at that location and may not even be in the same<br />

country or continent. They can silently steal or tamper with electronic<br />

files and hide evidence of their unauthorized activity.<br />

A recent study on Internet Security, conducted by the Datamoni<strong>to</strong>r<br />

Group, has found that companies have a very low awareness of the<br />

need for e-security. Over 50 per cent of businesses spend 5% or less of<br />

their IT budget on security technology, with just a mere 10% spending<br />

over 20% of their IT budget on security. So, the fact is that many<br />

companies will experience a major loss due <strong>to</strong> lax security.<br />

Neglecting adequate security measures in <strong>B2B</strong>i applications, which<br />

exposes a company's network <strong>to</strong> cus<strong>to</strong>mers and partners, may land a<br />

company in hot water. In a <strong>B2B</strong>i environment, even simple mistakes<br />

could lead <strong>to</strong> leakage of data that no trading partner would ever<br />

<strong>to</strong>lerate. Consider a scenario where a mistake or wrong configuration<br />

in a company's systems causes confidential pricing agreements or<br />

cus<strong>to</strong>mized catalog data sent by a supplier <strong>to</strong> leak out. The supplier's<br />

other cus<strong>to</strong>mers may cry foul, ending their business relationships with<br />

the supplier al<strong>to</strong>gether. The erring company may have <strong>to</strong> bear the<br />

liability and make up the difference in sales.<br />

Thus, a company participating in <strong>B2B</strong>i has <strong>to</strong> convince its trading<br />

partners that it can be trusted with their data. It has <strong>to</strong> continuously<br />

detect, correct and eliminate risks <strong>to</strong> mission-critical <strong>B2B</strong> systems and<br />

data. In fact, security and privacy controls are becoming manda<strong>to</strong>ry<br />

before access <strong>to</strong> participation in huge <strong>B2B</strong>i implementations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!