I am not a partisan of the FUD speeches (FUD = Fear, Uncertainty, Doubt). Today, however, I will pass on the negative side of the speech by sharing with you some thoughts about the tough days we are facing:
You’d say: what do these stories have in common and what do they have to do with me?… The common ground is this: whether intended or unintended, reliance on classic security technologies and practices leaves organizations and people vulnerable.
To avoid failed trust, security innovation, combined with vigilance, is key.
We tell children to learn through the mistakes of others, but what are we doing about it? Are you in a comfort zone that allows you to look at several reports, buy a technology, implement it and live afterward happy that you made the right choice and you are well protected? Good marketers will tell you “you are OK” and have nothing to worry about, and you remain assured that even though there are big hyenas outside, your fences are good and keep them out.
Then, one day, poof! your data appears somewhere in a repository and the authorities are telling you that actually you have been breached weeks, months, or even years before and you didn’t notice. And you have to work for two months to remediate, your company loses credibility, and eventually, you are forced to resign.
Looking at the human aspect of decision making, it is in our nature to play on the safe side by buying some big brand that is recommended and consecrated – after all, they say that “nobody got fired for buying Cisco…”. And, once you’ve bought the big brand, it comes naturally to renew it automatically. Not to mention that change is a delicate process, and it also involves all those downtimes and learning curves, etc… so, in the long run, some get lulled to remain with the “same old stuff” and live happily ever after. But is it really so?
A colleague was telling me about one of her friends complaining about virtualization, saying that they didn’t reach the promised benefits and when she asked them what security they use, they came with the answer “well, you know, the same best solution we use in our physical environments”. Why? Because “it functions”, or “it integrates within the global console”.
Nowadays almost all decent antimalware vendors have a dedicated product for virtualization. But what happens in those moments when the VMs go to the limits because of the antimalware and you have to restart them; it takes time until the scan engines are loaded, the time the attacker may need to put some malware there. This may sound paranoid but, for example, in the latest wave of attacks directed towards the big retailers, almost all of them were targeted and used in-memory malware that would update after some time with other components. So, in this given case, “the old stuff” may have provided the window of opportunity needed to gain access.
I just invite you to think of the questions:
If you have answered YES to at least one of these questions, maybe it’s time to consider a change – it may result in less expensive and more beneficially than you may think!
Horatiu B has been in the field of information security for about 14 years, switching lanes between marketing, sales, consultancy and business development. Engineer by formation, he thinks that a diagram says 10 times more than a speech but sometimes you have to employ words in order to describe diagrams. Horatiu’s principal areas of interest are in security management, practices, processes, buying behaviors and psychology.View all posts
Don’t miss out on exclusive content and exciting announcements!