In most things technology we check Google, Bing, Gartner’s Magic Quadrant and all the other areas to educate us. No matter whether it is the latest Blue Tooth Headset, Smart 4K TVs, Cell Phones and service plans, we can become “QUASI Subject Matter Experts” in 30 to 60 minutes. We are armed with the latest facts and figures down to the penny pricing and we do not need to interface with a sales professional. This is today’s reality. Enter Cyber Security.
With Cyber Security, is that the wisest tactic? Can websites and ratings tell you everything you need to know about what is going on in the industry? Is buying what everyone else is buying, going to keep you safe? Think about that for a minute…. If you can purchase the latest firewall and Intrusion Detection Protection (IDP) software, do you think the Hackers can too? Do you think the hackers may target the most popular systems to take to their lab to discover their weakness?
Hackers Today and Cyber Security
To help with the previous question we need to realize that the Hackers of today are no longer the Jolt Cola Drinking teenager with a computer in their parent’s basement. They are employees of International companies with CEOs and Budgets for R&D designed to figure out how to get into your network.
They are good at their job and your defenses will fail. Just ask Deloitte, Equifax, Whole Foods, Wendy’s, Chipotle, Sonic, Yahoo, Anthem and the countless others that don’t make the news.
Now you may think that Cyber Criminals won’t target you. You are too small, you don’t have what they want etc. etc. Do you know anyone who has received a Phishing email? Do you know anyone who has clicked on one? Maybe you? Did they work in your company or a similarly sized one? The Cyber Criminals are after anyone and everyone with a computer.
So, what do you do?
All the standard guards at the internet’s door remain necessary. You need firewalls, you need IDP and other standard security tools like Encryption, Training and Multi-Factor Authentication, but is that enough? All the breaches mentioned above had most if not all of that and more… they were breached anyway.
Some will say you need AI, to machine learn but any device with an IP address is visible to a hacker and at risk. Any logging device on your network has the potential to be corrupted. How can you trust anything from a corrupted network?
- 1.) You need a solution that is not visible to hackers.
- 2.) You need a solution that can see inside and outside your network to authenticate your logged information.
- 3.) You need essentially a 24×7 Pen Test with visibility to everything on your network.
- 4.) You need Top Secret Human experts who can avoid AI overwriting evidence of what happened.
- 5.) You need to exceed requirements for compliance and you need to provide your customers assurance that you exceed their Cyber Security requirements as well.
If your Cyber Security Solution doesn’t provide this for you, Voip Werx can help.