Too Much Cybersecurity?
In a recent article (see HERE) from ZDNet, IBM provided a report the Cyber Resillient Organization Report. It stated that, on average, IT for enterprise-size companies deployed up to 45 cybersecurity-related tools on their networks.
This is an astounding number and far more than should ever be needed. Secondly, it would create overlaps in security, causing all sorts of issues and potentially opening the enterprise up for those cyberattacks ultimately getting through.
So what is an enterprise-level, or even SMB sized companies to do to protect themselves? These are 4 steps we practice on a regular basis to ensure our clients are well-protected.
- Create an overall plan – Reviewing the overall structure of your network to see what needs to be protected so that you can address redundant issues with less security software.
- Implement – once you have reviewed the network, decide on the security softwares that offer the best protection without overlap in what they are protecting. In other words, if you are going to put in a spam filtering software, don’t get a virus software that also has built-in spam filtering the redundancy can cause multiple issues and may fail to work as a whole.
- Monitor/Test – as you install your security stack, you need to test it to ensure that each part is doing its job and not interfering with other security software within the stack.
- Review – Your network will change over even a short amount of time and new softwares and needs for security can arise rapidly. Just think about how fast COVID-19 changed the entire structure of networks, VPN’s, and softwares implemented in less than a month's time frame with all of the employees moving to work from home. You need to monitor those changes and make sure that as you make changes to your softwares and security stack that you do not run into issues of overlap. Again the best way to do this is, after making changes go back to step 3 and retest your entire stack. I would highly recommend an annual review of your security stack. New, better, and stronger security softwares are always hitting the market.
As always if you have any questions, please reach out to me at firstname.lastname@example.org
Greg Durnan is the Owner/President of AcaciaIT and very active in the business community of Southern Arizona. One of the founding members of the Greater Vail Area Chamber of Commerce and Chairman of the Oro Valley Chamber of Commerce he is very concerned about the needs of businesses in Arizona. He also strives to educate clients on Computer and Network Security through Lunch and Learns, articles, and webinars.
On the weekends he enjoys spending time with his wife and son at their ranch in Vail and working with horses.