Roadblocks to Achieving Adequate Cyber Security
Five major roadblocks stop most organizations from adequate defense against cyber-crime
The numerous data breach headlines continually remind us of an ugly truth. Far too many organizations are unprepared for today’s sophisticated and constant barrage of cyber-attacks.
By why is this? Why are so many corporations ill prepared and unable to adequately defend themselves against hackers and computer crime? Why do so many businesses experience a serious data breach?
I’ll be the first to admit that this is a very complicated issue and that the answers to these questions are not easy, nor are they the same for every company. Here’s my list of five major roadblocks that prevent most organizations from implementing adequate cyber security.
Five Roadblocks that Prevent Adequate Cyber Security:
- Senior management isn’t demanding adequate security. A lot of progress has been made in this area during the last several years, but corporate executives often believe that their industry or company will not be extensively targeted. They also struggle to see exactly how a data breach will impact their brand and revenue. Without compelling data that shows a) that the company is a likely target; and b) that damages would be significant; senior executives will generally not push for the required security improvements.
- Lack of skilled security personnel. Cybersecurity is amazingly complicated. It takes a lot of talented people to achieve enough critical mass to pull it off. Outsourcing can help, but there’s still a significant need for skilled security experts within. Unfortunately, they are very hard to come by.
- Insufficient planning and preparedness. There is no shortcut when it comes to cyber security. Too many organizations approach it as a checklist item they have to hurry through, resulting in half-baked policies and plans. Bad plans lead to bad results.
- Complexity. Security is a tough business. Getting a handle on what sensitive data exists in the company, and an accurate picture of the devices and equipment to secure can be overwhelming. A lot of companies bog down just trying to establish these two things. This is especially true where the security staff is short-handed, and most are.
- Weak and Obsolete Security Tools. Supported by organized crime and state sponsored crime rings, the adversary is formidable. Crimeware is evolving at an astonishing speed. It’s just not possible to defeat tomorrow’s threats using yesterday’s technologies. It’s surprising how many corporations are using decades old security technologies.
We live in a day that demands serious preparation for cyber-crime. Corporations need to be relentless in their pursuit for the leading security tools.
Click here to see how Lastline can help your organization defeat the most advanced forms of malware.
Latest posts by Bert Rankin (see all)
- Keyloggers and Other Password Snatching Malware - February 22, 2018
- Malware Detection Techniques – Why You Should Monitor Attack Campaigns - February 15, 2018
- Rootkit Prevention – Understanding Rootkits and the Role They Play in Malware Attacks - February 13, 2018