<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BSG (UK) &#187; data integrity</title>
	<atom:link href="http://www.bsgdelivers.com/tag/data-integrity/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.bsgdelivers.com</link>
	<description>Unlocking potential. Accelerating performance</description>
	<lastBuildDate>Fri, 12 Jun 2015 09:43:32 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>Spreadsheets in the enterprise, considering integrity (pt 2/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/#comments</comments>
		<pubDate>Mon, 17 Mar 2014 18:15:55 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[data integrity]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1373</guid>
		<description><![CDATA[<p>Integrity This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.” Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post). The [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Integrity</p>
<p>This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.”</p>
<p>Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post).</p>
<p>The threat is multi-dimensional:<br />
1. Altering a data element directly &#8211; like lowering your own sales target in the evaluation sheet<br />
2. Altering referenced data &#8211; linking your sales total to salesman of the year Bob’s total<br />
3. Removing key data points &#8211; deleting Bob’s biggest sales account entirely<br />
4. the list goes on&#8230;</p>
<p>There are complex tools within Excel and, if you speak “formulae” and can trace through multiple sheets simultaneously then you’re all good, you could find the modifications. Which is cool, right? What could possibly go wrong? Well &#8211; how do you know you’ve found them all, how long have you got to do the searching and fixing? And most importantly, how do you even know that there is a data integrity problem in the first place? On top of all this, the “business case” for Excel is usually that it is quicker, but by the time you’ve done all of this digging, that business case no longer stacks up.</p>
<p>Of course, even transactional enterprise systems of any type are vulnerable to data threat. The difference is that an enterprise system is layered: the data source and the reporting are separated which is not the case in Excel.</p>
<p>To repeat the rallying cry. Use common sense, think about the data you are handling, analysing, modelling and use the appropriate systems and countermeasures to make your work simple at the same time minimising risk of breaches. Easy, right?</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: bsgdelivers.com @ 2026-04-29 13:30:04 by W3 Total Cache -->