We are setting a precedence for a vulnerable future by reducing security to those "nerds." With several cybersecurity myths hovering over, the haze around realistic assessment of the current situation isn't going to be cleared soon.
2. We are setting a precedence for a vulnerable future
by reducing security to those "nerds." With several
cybersecurity myths hovering over, the haze around
realistic assessment of the current situation isn't
going to be cleared soon. Therefore, it is
quintessential for us to debunk such myths before
we take on the threat.
3. Classifying organizational risk as merely "cyber risk"
will only undermine the gravity of the threat. William
H. Saito, Special Advisor of the Cabinet Office for the
Government of Japan writes, "There's no such thing
as "cyber risk" -- it's risk" in his much-viewed piece in
Forbes magazine.
4. It maybe natural to lean toward believing
cybersecurity as a challenge unlike you've faced
before. But history will tell you nothing's truly new.
Back in the Victorian era, when communications and
commerce underwent a change with innovations in
technology, the threat perceived was no different.
5. Cyber threats when designated as "IT risks" will only
encourage pervasion through the entire system. It's
essential to know, cyber risks cut across departments
and that's what is menacing. Information once
digitized, there's no earmarking cyber threat to a
department.
6. Counting number of cyberattacks is a futile exercise
because, it is as good as counting bacteria. What
matters is the impact. Sometimes numbers lie. The
attacks that are thwarted by elementary defences
are also considered at times. So, they can be a
conflating mixture. Wise action would be to measure
the risks and prioritize the way to deal to with them.
7. Although good software is key to defend
cyberattacks. It is not enough to view software in
isolation. People are the numero uno threat. It is
essential you invest in training your resources and
improve the usability of cyber software, thereby,
striking a fine balance between safety and usability.
8. True. Device makers should be more responsible in
creating secure products that are robust. But, it is
often people who are unpredictable and unreliable.
People find ways to bypass security by using devices
that are not so secured--smartphones and tablets.