In our last blog post we gave you the first five reasons cybersecurity professionals use when insisting their current cybersecurity strategy is good enough. Relying on a secure network and being told by the board to reduce IT costs were just two of the reasons, but the fact is that no organization can ever afford to be complacent.
Reason #6: Our trusted advisor is telling us not to worry: we can do encryption on our firewall, switches and routers for less money and achieve the same result.
Turning on encryption in a network device WILL degrade the performance, typically by 50%. The reason lies in the way encryption has been deployed to date. In order to address the continued friction between operational goals and security imperatives, organizations need to decouple encryption from the infrastructure completely. The answer is Layer 4 encryption.
Layer 4 encryption is dedicated to providing the level of trust of data in motion and applications moving across the infrastructure, yet avoids any impact on network performance and complexity. Furthermore, Layer 4 operates in ‘stealth’ mode: it is only the data payload that is encrypted – not the entire network data packet. All of the complex management and maintenance problems created by traditional encryption deployment are removed. The data in motion is secure without adding complexity or compromising the operational performance of the infrastructure.
Reason #7: We’ve been advised that we don’t need encryption because our firewalls will keep the hackers out, or if not our intrusion detection will let us know immediately so we can stop a breach while it’s happening.
Current security thinking must move away from outdated thinking about securing the perimeter, assuming that breaches can be ‘protected’ against, ‘detected’, and ‘reacted’ to. But with the average time to detection being 120 to 150 days, depending on the source, this clearly is a fallacy. When it comes to data breaches, it is ‘when’ not ‘if’ it happens, so organizations must think about how they can best ‘contain’ a hacker from wreaking havoc on their data.
Reason #8: We prefer complexity over simplicity and are happy to spend the money on complex solutions and highly skilled staff to manage them.
You need to look at indirect costs as well as direct. The more management you have the more you’ll spend.
Reason #9: Thought leadership and innovation are not important. Why should we look at doing something that we do today, but in a better, simpler, more cost-effective, more scalable way?
The hacking community is always trailblazing ahead. What’s more, the game has changed; it’s no longer about the high profile, kudos-winning breaches. Today’s hacking community is far more focused on the theft of sensitive, customer data that will leave those affected with long-term repercussions. Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow.
Reason #10: Data compromise is something that happens to other businesses, not ours!
That’s what all the brands that have been in the headlines over the past 18 months thought as well.
So, now is the time to revisit your cybersecurity strategy to make sure your organization is as secure as it can be.
To find out more about our solutions, contact the Certes Networks team today.