Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Humans can’t be patched, so integrate IT security at board level

by The Gurus
October 7, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

With 2014 creating so many security headlines, the prospect of a breach is now a ‘when’ not an ‘if’.
 
The problem remains that risk is usually only managed at board level once a major attack has taken place, which besides being by far the most expensive way to resolve such problems, is neither logical nor sustainable. When the US retailer Target was hit by a data breach in September 2013, its profits fell by 46 per cent and the cost of dealing with the crisis were estimated to be $61 million.
 
If breaches are going to continue to happen, then cyber crime must be tackled from the top down in a proactive and strategic way in order to prevent such crippling financial and reputational damage from occurring on a regular basis.
 
So why are businesses still failing to implement efficient, functional IT security strategies? The issue is multifaceted, but there are several obvious barriers to the prevention of both targeted and opportunistic attacks. Overall, there is a need for a significant shift in business culture from regarding IT security as something ‘best left to the experts’ to something that permeates the heart of a company’s culture, including its policy and its people.
 
People
Effective IT security depends much less on technology than most managers might think – while investment in the right software is important, a lack of ownership over the potential for human error means companies are setting themselves up for eventual failure.
 
“Having a secure network, though essential, is only part of an organisation’s ability to operate an effective IT security process,” said Terry Greer-King, Director, Cyber Security, Cisco UK. “After all, any cyber attack is born from a weak link in the security chain. These ‘weak links’ can manifest in various forms, ranging from an employee’s benign ignorance of company IT policy to full-blown ‘social engineering’ of employees by malicious outsiders.”
 
Many of the measures employed by well-meaning managers run counter to the way ordinary human beings actually think and behave. Ted Julian, chief marketing officer of Co3 Systems, said: “When people act inappropriately, most organisations coordinate their response the same way they have for the last fifteen years: email, spreadsheets and ticketing systems.
 
“The proliferation of data, increasingly sophisticated attacks and mounting regulatory requirements have rendered these manual approaches completely ineffective. Important actions fall through the cracks and subject organisations to unnecessary risk.”
 
The unfortunate truth is that technology simply cannot protect companies against these very human problems, and out of date ways of dealing with transgressions within organisations are no longer working.
 
David Emm, principal security researcher at Kaspersky Lab, believes that the first step in the right direction is to work with human nature rather than against it, and “demystify security issues”. He said that the best method is to explain issues to staff in an “easy to understand” manner which should include varied forms of communication as well as including the usual catalogue of do’s and don’ts for staff to follow.
 
Although while humans can be an organisations’ weakest link, they can also provide a way to solve the problems they create through the analysis of available data. Uri Rivner, VP business development and cyber strategy at BioCatch, said: “Creating a baseline of a user activity, their interaction
s, habits, choices and behaviour, is now achievable.
 
“Intruder detection, once in the realm of network and content analysis, will become a human analysis task instead. New technologies based on Big Data analytics and behind-the-scenes cognitive biometrics are paving the path to a new defence doctrine that will detect human actions, locate anomalies and analyse their risk in real-time.”
 
Policy and strategy
Many companies purport to have taken all necessary measures to prevent a breach, when in fact most of them have simply bought expensive new software without taking a strategic, nuanced approach to protecting themselves.
 
Kurt Glazemakers, senior vice president of product strategy at Cryptzone, said: “For organisations to operationalise IT security requires a complete rethink to the way data and networks are secured, what we call a ‘zero-trust’ security model.
 
“While that might seem drastic, it doesn’t mean everything has to change; just the way we think about, and apply security in the enterprise. A zero-trust security model will naturally move organisations away from securing things, like networks and devices, to looking at context in order to secure the actions of users.”
 
 
Mark Steel is CEO of Cyber Security Expo

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Lastline – Virus Total is good, but industry needs something better

Next Post

Sophos completes acquisition of Mojave Networks

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information