top 10 ways to guarantee a data breach
TRANSCRIPT
How to Guarantee a Data Security Breach Within the Next 12-
MonthsThe 10 Ways to
Ensure Your Company’s Data is
Compromised So You Can Be the
Hero
A crippling security incident is really the only way to
find holes in your system.
A littleknownFACT:
So here are 10 ways to ensure a major lapse in data security so you can demonstrate to your manager how
vital you are in a crisis.
Assume that your information issecureeven if youdon’t knowwhere it is.
You must trust that whatever’s
out there is properly
protected.
It will only create a lot of unnecessary work for you.
Let your partners have whatever access they want to your networkand informationwithout restriction. After all, relationships with your partners are built on trust.
If you start restricting their access, you’re likely to
damage the relationship.
Know
that
your
execs
don’
t
care abou
t data secu
rity
They’re more focused onthe bottom line.
Do not create any
standards &
procedures.
No-one ever follows them anyway
and it’s really just something you
do to keep management happy.
A comprehensive solution is simply over-kill.
If you must buy something, make sure you purchase a security product that focuses on one particular area
of security
TOP
SECRET
Agree amongst your team that your company hasno sensitive information.
There’s no reason to spend money if
there’s nothing to protect.
Trust thatyour company’semployee
sknow how to
keep information
secure
0110001101010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001100110001001000101111010110100110010100110100101001100110001101010101101010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001110011000110101010100100010111101011010011001010011010010100110010101010010001011110101101001100101001101001010011001100100010111101011010011001010011010010100110011000110101010100100010111101011010011001010011010010100110011000110101010100100010111101011010011001010011010010100110101010010101110100101011011001000101111010110100110010100110100101001100110001101010100101010010001011110101101001100101001101001010011001010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001100110001101010101001000101111010110100110010100110100101001100110001011010101010010001001000101111010110100110010100110100101001100110001101010101011110101101001100101001101001010011010110111101011010011001010011010010100110011000110101010100100010011010101010010001011110101101010011001100011010101010011001100010110101010100101
Feel confident that your customized applications were
designed toautomatically protectagainst holes and breaches.
After all, they were developed by experts overseas.
Spend whatever budget you have at thegateway.
As long as you stop bad stuff from coming in, your information and applications are about as secure as
they can get.
IT Managers need to understand that the effort required to conduct security
discovery, classification or remediation far outweighs the possibility that the
network will be compromised.
But if you insist on preventing a security lapse ahead of time,
find experts who offer multilayered security solutions
… or you can just sit back and wait for the inevitable.
Kevin West, CEOK logix, [email protected]