Fear Hackers? First invest in an IT security culture change

A bald man in a suit smiles for the camera.

Cloud Computing Evolves: An Interview with Mats Johansson

By G C Network | June 6, 2019

Recently, Ericsson Digital released an amazing report on Edge Computing and 5G. In it, they explained how distributed cloud computing is paving the way for the future of network communications. They…

Rexroth unveils rexroth rexroth rexroth rexroth rex.

The IoT Nexus: Bosch Connected World 2019 in Berlin

By G C Network | May 11, 2019

Next week, I will be influencing #LikeABosch as I accept an invitation from the company to attend Bosch ConnectedWorld 2019 (BCW19) in Berlin, Germany. This is one of the world’s largest international…

A group of people sitting at a conference table.

Survive and Thrive With Digital Transformation

By G C Network | April 17, 2019

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the laments heard in conference rooms and board meeting around the world. While…

A cartoon man standing next to a white tesla model 3.

The “George Jetson” of Today

By G C Network | April 13, 2019

  He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his dad and today, he takes a self-driving car…

A city at night with the words 5g on it.

MWC19: Where Telecommunications and Cloud Meet

By G C Network | March 23, 2019

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specific business cases. This curiosity is what drove my excitement when Ericsson invited…

Tulane university school of professional advancement logo.

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

By G C Network | February 16, 2019

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson and Scott Goessling was selected for use by the Tulane University School of Professional Advancement, Applied Computing Systems & Technology Program as the textbook for…

A group of doctors looking at a computer screen.

5G Wireless Technology Connecting Healthcare

By G C Network | February 16, 2019

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industry’s pursuit of the many promises offered by connected patients, connected caregivers, and…

A woman wearing a red jacket and necklace.

Maria Lensing: The Network Platform for Healthcare’s Future

By G C Network | February 16, 2019

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s…

An image of a network of dots and lines.

How “Big Iron” Does “Big Regulation”

By G C Network | January 10, 2019

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those identified as confirm data breaches. A Ponemon Institute study also showed…

Two different signs that are side by side.

Mainframe Synergies for Digital Transformation

By G C Network | January 10, 2019

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, President and Chief Executive Officer of Broadcom, said: “This transaction represents an…

by
Kevin L.Jackson

 With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent survey said “yes” that a major attack causing widespread harm would occur by 2025,according to the Pew Research study. The cold hard fact, however, is that fear of the cyberterrorist and hackers, while definitely valid, is mostly misplaced.  I hold this contrarian view, because when you pull back the curtain on many of the recent breaches, you’ll likely see a mirror!

In a recent case, sensitive data including passwords seem to have been stored in the clear which is against all recommended best practices. There also may have been significant involvement from a company insider.  Focusing on application hacks, some of the most devastating have been due to a failure of the application developers to follow some basic best practices for application development.  Another important fact is that most of these breaches were not on cloud service providers.  These successful attacks were on enterprise built and managed IT infrastructures.

Our failure to protect our information and data is mostly due to our less than focused attitude towards cybersecurity.  Policies, procedures and processes play an important part in preventing security incidents but more is needed.  Every organizational employee must realize that they could be an entry point for hackers and be aware of their individual actions.  IT professionals must follow industry standard best practices for application development, network configuration, system configuration, etc. Many of which have gone through multiple iterations over the years. Everyone must also be proactive in their identification and response to cyber threats.  What I am describing is the need for a cultural change.

Creating a risk-conscious and security-aware culture is key to protecting an organization’s information infrastructure and data assets, risk management expert John P. Pironti wrote in 2012 ISACA Journal article. Business leaders must begin viewing information security as a benefit, rather than as an obstacle, and employ threat and vulnerability analysis – rather than fear and doubt – to drive adoption of points of view and controls

So let us first focus on changing our IT security culture. That will give us the edge we need in order to prevail over the cyber underworld.  We also must adopt a “trust-but-verify approach to monitoring and oversight of organizational and employee activities”. This would involve the adoption and expansion of automated security control point monitoring and reporting.  This, in fact, is a strength of any well designed and implemented cloud computing platform.

(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. To learn more about tech news and analysis visit Tech Page One. Dell sponsored this article, but the opinions are our own and don’t necessarily represent Dell’s positions or strategies.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network