It's no longer really a question of 'if' but 'when. Maybe not all companies will get breached, but many will, especially those that are specifically targeted by attackers. That's not about waving the white flag (more on that in a bit). And neither is it always an indictment of a company's security posture. Some organizations are careless. But many others are just unlucky. It's hard for instance, to imagine that organizations such as Sony, RSA, Oak Ridge National Laboratory, and Google got breached because they weren't paying attention to security.
The simple fact is that there's just far too many ways that a company can get compromised these days and it's unrealistic to assume that they can defend against every single attack, every single time. Unless an enterprise simply disconnects from the Internet, sooner or later, the bad guys always will get lucky. If someone really wants to, they will find a way in.
Enterprises (at least many of them) are spending more on security these days than before, but they are also more at risk. Any company with an Internet presence presents a large attack surface for those who want to target them. Operating systems, Internet browsers, application software and database tools continue to be as buggy as ever. The security products that companies use to protect themselves aren't always secure.
Then there's the whole consumerization of IT thing going on. And of course, there's always the errant end user who's going to click on a phishing email, or share music over a file-sharing network using their corporate PC, or post a corporate document on their Facebook page. And let's not forget the increasingly well-funded, increasing well-organized and increasingly well-armed cyber crooks that are constantly devising clever new ways of breaking in and stealing stuff.
None of this is about being defeatist or throwing in the towel and letting the bad guys walk all over. Rather its more about acknowledging that breaches can and will happen. It's more about damage containment and being ready for what happens when an intruder does break in. An intrusion means little, if the intruder has no place to go, nothing to steal and nowhere to hide.
Enterprises obviously need to continue doing everything they are doing and more. Perimeter and network protection technologies such as firewalls and anti-malware tools and IDS and IPS are still going to be vital for protecting against a vast majority of the threats out there.
Sign up for CIO Asia eNewsletters.
On Cloud Nine with IBM
Eric Schnatterly, Vice President IBM Systems for Cloud Platforms, Asia Pacific, talks about the company’s latest pipeline of innovation in the cloud and data space
The Future of Retail in a Digital World
Retailers may face cyber attacks like any other industry, but steps can be taken to guard against cyber crime.
Veeam Availability Platform Designs for Ransomware Resiliency Series
The threat of ransomware is real and should be top of mind for CIOs as well as technology administrators of all types. In this brief, Veeam® will share some key tips to add ransomware resiliency to provide the best levels of Availability for critical applications and data.
Transforming Data protection with Integrations for Microsoft Azure and Microsoft Office 365
Veeam for the Microsoft Cloud provides a consolidated solution for virtual, physical and cloud-based workloads with integrations for Microsoft Azure and Office 365.
VMware Virtual SAN risk avoidance and Availability
Veeam Backup & Replication provides full support for VMware vSAN, enabling faster backups through smart logic that reduces network traffic and enables backup and restore for the storage policy associated with the VM.