Top 3 Internet Security Myths

Top 3 Internet Security Myths

Top 3 Internet Security MythsThere is quite a bit of misinformation out there around Internet security, and it’s driven by a culture of fear, uncertainty and doubt. Though cyber threats are real and can strike anyone, anytime or anywhere, you can implement solid security by taking a methodical approach and identifying the right tools to meet your needs. A good place to start is by dispelling the more common myths security professionals encounter.

Myth 1: My defenses are already impenetrable.

You could have the newest, flashiest tool, every encryption and protection known to man, and a security policy that reads like “War and Peace,” and you still won’t be 100 percent protected.

The reality is that there is no silver-bullet solution to protect you from everyone; a determined attacker will eventually get in. Accept that fact and focus on detection and real-time mitigation instead of a prevention-only strategy. Develop suitable standards for every use case. This will allow you to loosen or tighten controls as dictated by the business, rather than applying an across-the-board policy.

Myth 2: We spend enough on security.

How do you know that enough is really enough? Gartner data shows that only 5 percent of IT spending goes toward security. That means just 5 percent of one department’s budget is responsible for the ultimate protection of every asset the business has: customer and employee data, intellectual property, revenue sources, B2B interfaces, supply chain, workflow, etc. Anything that you use to do business is a potential target.

Once this scope is understood, the Chief Information Security Officer (CISO) can start aligning risk and opportunity. This will give you a good indication on the value of your IT spending and where it should be allotted; the amount will be evident. No two companies will be the same.

Myth 3: We won’t get attacked.

This is more plain stubbornness than a myth. The “it-only-happens-to-other-people” defense won’t really help you when you’re facing an advanced persistent threat. You lock your car doors after you park however unlikely it is that the vehicle will be stolen, so why wouldn’t you do more than the bare minimum to protect your business’ most vital assets?

To take an honest look at your security risks, you must adopt the mindset that you are a potential target in order to develop a no-nonsense statement of risk and build a classification framework to force the business, as a whole, to confront all security requirements.

Any company that does a true analysis will be able to develop policies and deploy defenses that provide the best protection possible. There is no bulletproof solution, but you will have a much greater handle on which threats are most serious for your company, enabling you to set up analytics and monitoring processes to identify breaches quicker.

It isn't about just buying the latest gadget; it’s about adopting a security mindset that furthers the goal to make sales without being a burden on the business.

About the Author

Vann Abernethy is the senior product manager for NSFOCUS, where he is responsible for product planning and program execution for multiple security offerings.

Featured

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.