Fear Hackers? First invest in an IT security culture change

Convergence: The Catalyst to Transform Scientific Research

By G C Network | January 7, 2015

by Melvin Greer  Greer Institute for Leadership and Innovation A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence—the coming together of insights…

Cloud Computing Promises: Fact or Fiction

By G C Network | December 29, 2014

Cloud computing is currently making information technology headlines, and vendors are aggressively promoting the many benefits it can provide organizations. This White Paper addresses the claims and questions that are…

Super Smart Person’s Guide to Cloud Computing – San Diego

By G C Network | December 24, 2014

We are offering a fun and educational event just about the cloud. This session will help CEOs, Directors, Managers, and Dilberts learn what the heck the cloud is all about.…

A Managed Services Business Owners Lament: A talk with Joe D.

By G C Network | December 22, 2014

 by Kevin L. Jackson A few days ago I received a call from a small business owner asking if I would meet him for coffee.  He wanted to run some…

Technology and the Evolving Workforce

By G C Network | December 17, 2014

by Melvin Greer Managing Director Greer Institute for Leadership and Innovation According to a Greer Institute Workforce and Talent study, the 2020 workforce is both “the most educated and culturally…

Security attacks and countermeasures

By G C Network | December 14, 2014

by Sandra K. Johnson   Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption…

ITIL in 7 Minutes!

By G C Network | December 9, 2014

What is ITIL & how can it benefit your organization? Learn the answers to these questions plus gain an understanding of the ITIL Service Lifecycle in this video.  Download a…

How Resilient are FedRAMP Clouds Anyway?

By G C Network | December 8, 2014

By Jodi Kohut For the uninitiated, FedRAMP is the Federal Risk Authorizationand Management Program, a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for…

Federal Tech Talk: Cloud Transition Challenges in Government and Industry

By G C Network | December 2, 2014

Cloud Computing is revolutionizing today’s business marketplace. While “learning the art of the possible”, corporate executives today are struggling with the business and security challenges associate with this important transition. Just…

Cloud, Mobile, Social and Cyber: 2015 Predictions That Will Rock The World (AGAIN!)

By G C Network | December 1, 2014

2015 PREDICTION TIME!! The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological…

by
Kevin L.Jackson

 With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent survey said “yes” that a major attack causing widespread harm would occur by 2025,according to the Pew Research study. The cold hard fact, however, is that fear of the cyberterrorist and hackers, while definitely valid, is mostly misplaced.  I hold this contrarian view, because when you pull back the curtain on many of the recent breaches, you’ll likely see a mirror!

In a recent case, sensitive data including passwords seem to have been stored in the clear which is against all recommended best practices. There also may have been significant involvement from a company insider.  Focusing on application hacks, some of the most devastating have been due to a failure of the application developers to follow some basic best practices for application development.  Another important fact is that most of these breaches were not on cloud service providers.  These successful attacks were on enterprise built and managed IT infrastructures.

Our failure to protect our information and data is mostly due to our less than focused attitude towards cybersecurity.  Policies, procedures and processes play an important part in preventing security incidents but more is needed.  Every organizational employee must realize that they could be an entry point for hackers and be aware of their individual actions.  IT professionals must follow industry standard best practices for application development, network configuration, system configuration, etc. Many of which have gone through multiple iterations over the years. Everyone must also be proactive in their identification and response to cyber threats.  What I am describing is the need for a cultural change.

Creating a risk-conscious and security-aware culture is key to protecting an organization’s information infrastructure and data assets, risk management expert John P. Pironti wrote in 2012 ISACA Journal article. Business leaders must begin viewing information security as a benefit, rather than as an obstacle, and employ threat and vulnerability analysis – rather than fear and doubt – to drive adoption of points of view and controls

So let us first focus on changing our IT security culture. That will give us the edge we need in order to prevail over the cyber underworld.  We also must adopt a “trust-but-verify approach to monitoring and oversight of organizational and employee activities”. This would involve the adoption and expansion of automated security control point monitoring and reporting.  This, in fact, is a strength of any well designed and implemented cloud computing platform.

(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. To learn more about tech news and analysis visit Tech Page One. Dell sponsored this article, but the opinions are our own and don’t necessarily represent Dell’s positions or strategies.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network