Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

How CSOs can avoid the shadow of a cyber security Groundhog Day

by The Gurus
February 20, 2017
in This Week's Gurus
Share on FacebookShare on Twitter

Written by Duncan Hughes, Systems Engineering Director, EMEA, A10 Networks
Every year, in the US town of Pennsylvania, people gather in droves to watch a groundhog predict how much longer winter will last. For Americans, it’s a pretty big deal to see this glorified gerbil pop up and look terrified as throngs of onlookers wait in hushed silence to see whether the mighty Phil from Punxsutawney will see his shadow.
Historically, the varmint is only 39 percent accurate, but in truth that’s probably better than most human non-groundhog meteorologists.
Like groundhogs, security leadership and CSOs constantly emerge from their burrows — excuse me, offices — and tentatively look around for their shadows. In this scenario, it’s usually a compromise or data breach.
Once they see it, they scurry back below ground to their safe space where they cross their fingers and hope everything blows over. They can re-emerge once the bad weather is gone.
This plays out time and time again. Year after year, more security leaders see their shadow. Why? Because when it comes to cyber security, people usually face the same direction. Unfortunately, the position of the sun (the security industry itself) typically doesn’t move much.
CSOs tend to fall into the same traps day in, day out, in an often vicious, unbreakable cycle (sort of like the plot of the movie “Groundhog Day”).
 
Security becomes a constant game of whack-a-mole (or whack-a-groundhog, in this case); a threat pops up, you try your best to knock it back into its hole, only to have another appear. Then another, and another. It’s nearly impossible to keep up. The shadow of the last breach or most recent compromise is always there, taunting them.
In the end, it leads to six more weeks (or more) of winter (subpar security).
Break the Cycle
Attitudes toward security must shift if security leadership and CSOs ever hope to stop staring at that shadow and break the cycle. Here are some best practices cyber security pros can leverage to break out of the Groundhog Day rut and improve security. It’s time to emerge shadow-free:

  • Be proactive. Trying to stop threats as they occur is inadequate. Eventually, you’ll be overpowered and something will get through. Protect the network and your apps at the edge. Put solutions in place that catch and mitigate threats before they get in.
  • Defend your network and apps. Do you have adequate protection from DDoS attacks? How about the ability to uncover threats concealed in SSL- encrypted traffic? These types of solutions can help you avoid reliving the same attacks over and over again.
  • Create and enforce a strong security policy. An unenforced security policy is less valuable than the paper it’s printed on. Hold end-users, employees and yourself accountable. Companies will spend a great deal of time drafting security policies that ultimately go unenforced.
  • Train your users. Do your end-users know how to set strong passwords across personal and business accounts? How to use two-factor authentication? How to spot a phishing email? Train them to be security-minded.
  • Think security first. So often, security is an afterthought. When you spin up apps and solutions, security should always be among the first questions.
  • Test and assess. Perform tests on your network and applications to uncover any potential vulnerabilities. Just because you haven’t seen it, doesn’t mean it isn’t there. Regular tests can break you out of the repetitive cycle of fighting threats.

These simple steps can help CSOs avoid seeing their shadow and getting stuck with six more weeks (or much longer) of bad security.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Information management 101 – mid-market blunders and how to avoid them

Next Post

Non-Malware Attacks Set to be the Biggest Problem for CIOs

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information