Fear Hackers? First invest in an IT security culture change

“Cloud Musings” Named A “Top 50 Blog”

By G C Network | August 27, 2010

My appreciation and thanks goes out to Jeremy Geelan for including “Cloud Musings” on his list of the Top 50 Cloud Computing Blogs. Thanks is also in order for “HighTechDad”…

Will Oracle Buy Informatica?

By G C Network | August 25, 2010

According to 1,250 ERP Software Advice readers that will be Oracle’s next acquisition. Terradata came in a close second in this race, suggesting that Oracle will “…play it safe next time…

What’s Next For Oracle?

By G C Network | August 14, 2010

Watching Larry Ellison and Oracle over the years as it has morphed itself is a real study in market dynamics.  It’s transformation from database company through middleware provider to now…

Enterprise Architecture Enables Innovation: Melvin Greer, Lockheed Martin

By G C Network | August 11, 2010

Earlier this week, my good fried and NCOIC colleage, Melvin Greer was interviewed by Rutrell Yasin of Government Computer News. In the interview, Mel focused on the importantance of entrprise…

Are You A Cloud Architect? NJVC Needs YOU!!

By G C Network | July 31, 2010

If you are a cloud computing architect, have I got news for you!  NJVC, one of the largest IT solutions providers supporting the U.S. Department of Defense (DoD), is building…

“Army Private Cloud” RFP Released

By G C Network | July 28, 2010

Last week the US Army released  a procurement solicitation for the Army Private Cloud.  This $249M solicitation calls for a 1-year base period with four, 1-year options. Department of the…

Cloud Musings Direct Launches

By G C Network | July 15, 2010

In response to request, the inaugural “Cloud Musings Direct” newsletter was launched this week.  This bi-weekly electronic newsletter will highlight important government cloud computing industry trends and events.  If you…

CloudExpo Europe 2010: Not Your Father’s Prague

By G C Network | June 30, 2010

When my good friend Jeremy Geelan invited me to speak at CloudExpo Europe in Prague, Czech Republic my imagination went into overdrive.  Being a child of the 60’s and a…

NCOIC Plenary Highlights Collaboration and Interoperability

By G C Network | June 29, 2010

Last week in Brussels, Belgium, the Network Centric Operations Industry Consortium highlighted it’s support of collaboration and interoperability through an information exchange session with the National Geospatial-Intelligence Agency (NGA) and…

GovLoop “Member of the Week”

By G C Network | June 22, 2010

Thank you to Radiah Givens-Nunez and GovLoop for the honor of being their Member of the Week for June 21-25, 2010. Created in 2008, GovLoop is an online social network…

by
Kevin L.Jackson

 With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent survey said “yes” that a major attack causing widespread harm would occur by 2025,according to the Pew Research study. The cold hard fact, however, is that fear of the cyberterrorist and hackers, while definitely valid, is mostly misplaced.  I hold this contrarian view, because when you pull back the curtain on many of the recent breaches, you’ll likely see a mirror!

In a recent case, sensitive data including passwords seem to have been stored in the clear which is against all recommended best practices. There also may have been significant involvement from a company insider.  Focusing on application hacks, some of the most devastating have been due to a failure of the application developers to follow some basic best practices for application development.  Another important fact is that most of these breaches were not on cloud service providers.  These successful attacks were on enterprise built and managed IT infrastructures.

Our failure to protect our information and data is mostly due to our less than focused attitude towards cybersecurity.  Policies, procedures and processes play an important part in preventing security incidents but more is needed.  Every organizational employee must realize that they could be an entry point for hackers and be aware of their individual actions.  IT professionals must follow industry standard best practices for application development, network configuration, system configuration, etc. Many of which have gone through multiple iterations over the years. Everyone must also be proactive in their identification and response to cyber threats.  What I am describing is the need for a cultural change.

Creating a risk-conscious and security-aware culture is key to protecting an organization’s information infrastructure and data assets, risk management expert John P. Pironti wrote in 2012 ISACA Journal article. Business leaders must begin viewing information security as a benefit, rather than as an obstacle, and employ threat and vulnerability analysis – rather than fear and doubt – to drive adoption of points of view and controls

So let us first focus on changing our IT security culture. That will give us the edge we need in order to prevail over the cyber underworld.  We also must adopt a “trust-but-verify approach to monitoring and oversight of organizational and employee activities”. This would involve the adoption and expansion of automated security control point monitoring and reporting.  This, in fact, is a strength of any well designed and implemented cloud computing platform.

(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. To learn more about tech news and analysis visit Tech Page One. Dell sponsored this article, but the opinions are our own and don’t necessarily represent Dell’s positions or strategies.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network