“I could end the deficit in 5 minutes. You just pass a law that says anytime there is a deficit of more than 3% of GDP, all sitting members of Congress are ineligible for re-election.” - Warren Buffett
Whether they recognize it or not, many cybersecurity leaders in both the public and private sector are either unprepared or relying upon inadequate cybersecurity protection. Their organizations are at risk by depending upon security silos comprised of single function security products that aren’t appropriate for today’s broad attack surfaces. Keeping digital assets secure requires cybersecurity protections that will secure corporate assets today, and for decades to come.
Most homeowners have had to deal with a pest problem at some point. In addition to the mess their intrusion may create, they can also cause a great deal of damage. Trying to determine their access point can be a tricky endeavor. You can attempt any number of lures and traps; sometimes with success. But the truly insidious and elusive pest will require the services of an expert.
The phrase “tempest in a teapot” refers to assessing a high level of importance, or over-inflated value to an event, object or process. There are some who assert, for example, that the need for a comprehensive cybersecurity platform is unnecessary. They claim data protection and privacy can be adequately ensured by deploying diverse security products and tools to protect their data from inside and outside malicious activity.
Most golfing aficionados will agree that choosing the right clubs will optimize your game. Using a putter on the first drive, for instance, won’t get you to the fairway. That journey would involve many attempts and missteps. When it comes to business, there are no mulligans to cover your... assets. Trying to win the war against cyber crime without the right tools can lead to lost data, lost productivity due to downtime, time and costs to bring the business online, and damaged brand reputation.
A scathing report published in 2021 by the Department of Homeland Security, titled “Federal Cybersecurity: America’s Data Still at Risk”, highlighted America’s “at risk” legacy systems. It brought out the fact that in 2020, there were 30,819 information security incidents across the Federal Government. The report referenced their 2019 report that sighted eight Federal agencies, including DHS, State, DOT, HUD, USDA, HHS, Education, and SSA that failed to comply with basic cybersecurity standards.
We all know what it means when someone says, “X marks the spot”. It’s a well-worn phrase that signifies the exact location of something. For some, it might conjure an image of a pirate’s treasure map, or the precise location of a destination starting or stopping point.
Joe, a humble and overworked Seattle IT Specialist, has taken great pains to develop an interesting, and only slightly embellished personal profile on the Pleez Chooz Me dating app. After several fruitless weeks, his ad was answered by the lovely Eva, a 30-something pharmaceutical technician from Bangor, Maine. After several months of meaningful dialogues, Joe arranges for Eva to visit, forwarding her the $1,500 for a First-Class ticket. On the special day, Joe waits at SeaTac airport, flowers in hand for hours. The fictitious Eva never arrives and her profile vanishes from the dating app. Poor Joe has been catfished; hook, line and sinker.
We currently live in a cultural climate of escalating misinformation, spurious ideations, and fomenting conspiracy theories. Pick a topic - health, finance, politics… Brittany Spears - and you’ll unearth a plethora of factual distortion and false beliefs. The Covid-19 pandemic and subsequent vaccination program continues to be fraught with conflicting confabulations and political media manipulations. It’s hard to know what to trust, where to place your faith, or how to attain a sense of security. And security, on a personal and business level, is a core primary concern. Relying upon inaccurate information or outdated myths could lead to devastating consequences.