3 Ridiculous Myths About Cybersecurity

By

MYTH #1

You can 100 percent keep the bad guys from getting in. 

The truth is, if the bad guys want in bad enough they will find a way in.  Advanced attackers and the APT are savvy, sophisticated, well-educated, and often well-funded.  While I don’t believe you can stop the bad guys from getting in 100 percent of the time, I do believe you can be proactive about it.  Anticipate it, prepare for it, and in doing so - put yourself in a position of power.  And while you can’t guarantee the bad guys won’t get in, you can feel confident about being able to mitigate the impact to your organization.

MYTH #2

You don’t have anything worth taking. 

First, if that’s your answer, your organization needs better self-esteem.  Advanced attackers and the APT don’t just go after military secrets and big ticket items like KFC’s secret recipe.  If your company has customer data, credit card information, makes the little widget that’s part of a satellite, has information on M&A or negotiations – it’s worth having and someone will want it.  Identify what these gems are for your organization and put a plan in place to protect them.

MYTH #3

It won’t happen to your organization. 

First, read myths #1 and #2.  Second, reset your expectations.  You WILL at some juncture be compromised - in fact, you probably already are.  The chances of it happening are the same as you getting a tan if you went to a Dubai beach in summer - it’s inevitable.  Expect it, plan for it and make sure that you’re in a position to identify the threat and respond to it immediately.  In other words, have your mop and bucket handy, it’s going to get wet. 

It’s a scary world out there, but you’ve got great resources on your side.  Take advantage of them.  Make sure what you put into place gives you the visibility, context and automation you need to resolve any security incident that comes your way.

John Bentley is the Director, Middle East, Africa and India at AccessData. 




Edited by Stefania Viscusi


SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More