September 13, 2016 — Removing the incentive for breaches and fraud: A new approach to cybersecurity
This is a guest post by Robert Capps, vice president of Business Development for NuData Security, discussing a new approach to cybersecurity.
Where there is treasure to be had, there will be thieves trying to take it for themselves. This is the dark side of human nature, as sure as death and taxes, and it’s not going to change. Whereas thieves used to use shovels to unearth other people’s treasure, today they use a variety of sophisticated digital tools to take what isn’t theirs.
At the same time, consumers want life to be easy. That’s also a part of human nature that’s not likely to change. Yesterday’s washing machines and microwavable meals are today’s online shopping and automatically saved, consistently re-used passwords. People know that, especially in light of ongoing data breaches, they should use long passwords containing many types of characters and unique passwords for each online account – but it just seems too difficult to put forth the effort or keep track of it all. These modern realities can make IT professionals skeptical about the prospect of being able to provide effective security.
However, there is a way for organizations to grapple with these twin challenges and still protect their entity and their customers. That’s because, ultimately, it’s all about the data. As long as it’s valuable, it will be stolen. Efforts to devalue data will be the most impactful actions an organization can take to reduce the number, scope and impact of breaches. So how is this accomplished? Read on. The hard slog of cybersecurity Once malicious actors have data that’s been stolen, there’s no way to get it back or prevent its misuse. When it’s gone, it’s gone. In addition, cybercriminals have numerous ways to attack – and they keep finding or inventing more. It’s similar to physical crime or terrorism in that way. It’s not feasible to protect an airport, for example, against all possible attack vectors—from every entrance, from the sky, from underground—let alone means of attack that security teams haven’t thought of yet.
For the complete article, go here.