- News & Resources: Listings >
- Blog
- How to Improve Safety and Security in Schools – Cloud Manage Network
- Top 10 Cybersecurity Threats in 2024
- Microsegmentation: Protecting Data from Cyber Threats
- Retail shoplifting and loss prevention: How to protect your business
- Generative AI Cost Optimization Strategies
- Why Do I Need to Protect My Cloud?
- 10 Reasons for Engaging Outside Experts to Manage Your Cybersecurity
- Why Hiring a 3rd Party MSP Expert Makes Sense and – and Cents (MANY cents!)
- Brand and Network Considerations When Adopting AI Corporately
- Integrating XDR, SIEM, and SOAR
- 3-2-1 –Go? Not so quick, this time.
- 5 Things a CISO Shoud Know
- 10-Step Patch Management Checklist
- Penetration Testing vs. Breach Attack Simulation
- Current big cyber breaches and impact on businesses
- Smart Infrastructure Gets Lit Up!
- Securing Industrial IoT: The Missing Puzzle Piece
- 7 Common Cybersecurity Mistakes Made by SMBs
- The Future of Physical Security: Cloud-Based Systems
- Autonomous and Sensor Technology Use Surging
- 2024 Facilities Trends Will Require Facilities and IT Teams to Work in Tandem
- NGFW vs. WAF. What’s the Right Firewall for You?
- Chris Hadfield’s Words To Live By
- Industrial Revolution 4.0 + IIoT
- Digital Fluency Drives Innovation
- Your Cloud Needs Protecting, Too
- Your building alarm systems could become obsolete. In 2024!
- Zero Trust 2.0: Zero Trust Data Resilience (ZTDR)
- We just got, or got used to, Wi-Fi 6. What is Wi-Fi 7?
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – 4th and Last in a Four-Part Series
- Why 2024 is the Year for AI Networking
- International Women’s Day is Tomorrow – Great Time to Think About…
- Data-Centric Security Step One: Classifying Your Data
- The Network – Unsung Hero of Super Bowl LVIII
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – Third in a Four-Part Series
- Boosting IT Team Performance by Fostering Intuition, Curiosity and Creativity
- Breach Remediation Costs Can Wipeout Bottom Line and Business
- Hoodied Hackers Now Favour Hugo Boss
- What Do You Need to Tell the Board? Business Metrics that CISOs Should Share – Second in a Four-Part Series
- How to Get People to Re-Engage After the Holidays
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – First in a Four-Part Series
- Android Devices MUST be Updated + IT Departments Being Cut as Privilege Escalation Escalates
- Today’s Common Cloud Migration and Management Concerns
- Protect Your Healthcare Network from Cyberattack – Lives are at Stake
- Happy Halloween: Black Cats Lead to Boo….Hoo.
- Insurance Underwriters are Protecting Their Flanks
- Insurance Companies Cracking Down as Cybercriminals Become Better Business Builders
- Scary Cyberattacks Stats
- Parents, Profs and IT Professionals Perceive Back-to-School Through Different Lens
- Zscaler’s new IDTR and other tools that leverage generative AI
- Vanquish Vaping, Vandalism and Villainy
- Fabric for Fast-Paced Environments
- Changes to Cyber Insurance Requirements – What you Need to Know
- Cybersecurity Readiness – Newly Released Report
- Passwords Leaked…Again
- 10-Step Patch Management Checklist
- Remote – Again – For Now… and Still Maintaining Engagement
- Protecting Pocketbooks, Passwords and Property from Pilfering
- Raspberry Robin: Highly Evasive Worm Spreads over External Disks
- Cisco Introduces Responsible AI – Enhancing Technology, Transparency and Customer Trust
- Managing Customer Trust in Uncertain Supply Chain Conditions
- Hope on the Horizon
- Toys of Tomorrow… What will spark your imagination? Fuel your imagination?
- Protecting Purses and Digital Wallets
- The Password that Felled the Kingdom + MFA vs 2FA
- The MOE’s RA 3.0 and Zscaler
- 7 Critical Reasons for MS Office 365 Backup
- Penetration Testing Important, but…
- Social Engineering and Poor Patching Responsible for Over 90% of Cybersecurity Problems
- Breach Incidence and Costs On the Rise Again + 5 Ways to Reduce Your Risk
- Cybersecurity Insurance Policies Require Security Audits and Pen Testing
- Wireless strategies for business continuity gain importance as enterprise expand IoT, cloud, and other technologies
- How Cybercrooks are Targeting YOU
- Enabling Digital Transformation with Cisco SD-WAN
- WFH Post Pandemic – What It Will Look Like. What You’ll Need.
- Leaders to looking to the IoT to improve efficiency and resiliency
- Cyber Security Vernacular – Well, some of it, for now
- Why You Need Disaster Recovery, NOT Just Back-Ups
- 10 Reasons Why Having an Expert Manage Your Cybersecurity Makes Sense and Saves Dollars
- Converting CapEx IT Investments into Manageable OpEx
- The Hybrid Workplace – Planning the Next Phase
- Cisco Cloud Calling: Empowering Customers to Thrive with Hybrid Work
- When You Can’t Access the Cloud
- How to Keep On Keeping On
- New Cisco Research Reveals Collaboration, Cloud and Security are IT’s Top Challenges
- Threats from Within on the Rise
- Cloud Covered? If Not, Take Cover!
- Zero Trust and Forrester Wave Report
- Password Based Cyber Attack: Like Leaving Keys Under Doormats
- So, What’s Up With Sensors?
- Sensors and Systems Create a Digital “Last Mile” and Help Skyrocketing Costs
- Scanners Provide Peace of Mind for Returning Students and Workers
- Sensors Improve Operations and Bottom Line… Easily and Cost-Affordably.
- Cisco Meraki Looks at 2021
- 2020 Holiday Shopping: Cybersecurity and Other Tips to Safeguard Wallets and Systems
- How to make the most of the technology you have
- Personnel, Planet and Business Progress: More Interdependent Than Ever Before
- Sure… you can get them all in the boat – but can you get them to work well together?
- Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
- Cloud Data Must be Protected, Too!
- Don’t Let Anyone Get the Dirt on You – Make It Instead!
- How IoT Devices Can Help You and Your business
- WebEx – A World of Possibility
- Creating Your Breach Response Plan Now Will Save You Thousands Down The Road
- Been hacked? Here’s what you must do next.
- The Need for Pen Testing is At an All-Time High
- 5 Ways an IT Reseller Improves Your Performance and Peace-of-Mind
- 5G and Wi-Fi 6: Faster, more flexible, and future ready. Are you?
- Network and Data Security for Returning and Remote Workers + Disaster Recovery Symposium
- Collaboration and Cisco WebEx: Protecting Your Data
- Thursday’s Virtual Conference Tackles Today’s Supply Chain Trials and Tribulations
- 10 Tips to Reduce Cloud Storage Risk
- COVID-19 Crisis Fuelling IT Spending
- Supply Chain/Logistics Experts Share Their Expertise
- Cisco Breach Defence Overview
- Announcing Our New Website and Blog
It’s that time of year again – no not time to break out the eggnog for the last week celebrations before you break for the holidays. It’s “break out in sweat” time, as you plan what to present to The Board for the perennial, beginning of the year, “Let’s Take Stock” session.
Number One on Business Leaders’ Minds When It Comes to IT: Security. Our own research, as well as all studies consulted for this article, show that executives responsible for the bottom line, which means also being responsible for the company/brand reputation, do not want or need to know all network-related details.
Why is that?
20 years ago, around the time most of your board members likely started their careers (perhaps longer, for some), most of them worked in an environment where there was a data centre, to which branch offices, and remote workers (though there were far fewer as a percentage of employees and other stakeholders) through a VPN – and there was the Internet, though it was used more for far fewer business functions than is the case today. Non-IT people then, typically only learned as much as they needed to learn in order to perform their jobs.
Fast forward to today. You’ll be briefing the board about 2024’s far more complex business environment. You’re not only dealing with data centres, remote and hybrid workers (in greater numbers and percentages, too), branch offices and the Internet, but have added in SaaS, application programming interfaces (APIs), more use of container technologies and quantum computing, public, private and multi-cloud, IoT and IoT Cloud, not to mention how AI and ML will impact the organisation.
It’s a lot for your team to manage. It’s almost insurmountable for most people without a tech background to keep a handle on all this.
What Board Members Want to Know
Instead of all the nitty-gritty details, senior executives and board members need to know that their main concerns have been addressed. Specifically, they want to know:
- Will we be able to keep our business running if attacked? In other words, is our mission-critical infrastructure well-protected? Are there redundancies in place, just in case?
- Will we be able to safeguard our proprietary intellectual property, client lists
- Are we doing everything we can/enough to protect all personal data in our safekeeping?
- Are we fully compliant with all cyber-insurance requirements, so that we are fully-protected if we are breached?
- Will our IT support our business strategies and growth moving forward?
Unfortunately, the first five items on the list relate to protecting the corporate reputation – which is needed, of course, for the business to grow. Three years ago, what is now #6, was #1.
So, what do you need to tell board member so they sleep at night, and you can, too?
What Board Members NEED to Know
Obviously, you must address the above items, but CISOs also have an obligation to share other details, too.
The top 10 Categories:
-
Expanding Digital Footprints Increase Vulnerability
-
Data and Data Lake Segmentation
-
People, Phishing and Policies
-
Stakeholder Security, including digital supply chain security and third-party risk management
-
Incident Detection and Response + Testing Protocols and Practices
-
Infrastructure – State of Current Architecture and Equipment +Future Needs Assessment
-
New Technologies, including Enterprise -Wide and Department-Level Applications as well as use of IoT, ML and AI
-
Investment Levels and Efficacy + Regulatory Compliance and Insurance Coverage
-
Vendors and Portfolio Management
-
Financial Asset Risks + ROI and Losses
In our first installment, we’ll discuss the first two.
-
Larger Digital Footprint Makes Firms More Vulnerable
It’s a double-edged sword. As companies expand, move more applications to the cloud, while simultaneously using more cloud-based apps, and pursue their overall digital strategies, product productivity increases. Unfortunately, as you know, so does the attack surface.
This means less understand that if a virus does not worm its way in (pun intended – sorry), it can spread at warp speed if proper access protocols and zero trust aren’t adopted, and that the damage will impact the entire organisation, and the bottom line.
This is the first item on our list because, unfortunately, despite all the scary headlines, some firms are becoming increasingly complacent. They have heard the phrase, “It’s not a matter of if, but when” so many times, that they have started to ignore the warning. It is a little like smokers disregarding health warnings on cigarette packages.
-
Data and Data Lake Segmentation
Data Lakes?
Most executives will be familiar with centralized data warehouses, or simple databases. A data lake, however, can store, secure and process all kinds of data, including unstructured and semi-structured data such as photos, graphic images, audio and video. Machine learning, advanced analytics and, to a certain degree AI, all you/need a data lake.
Whether using a simple database or data Lake, board reassurance will be enhanced if you communicate that you are tracking:
-
What percentage of data is encrypted, and if you are encryption programs meet your most current insurance standards – not to mention industry ones, too, of course to
-
What percentage of data is centralized, and how you monitor/control data that is in use, or being used by satellite offices and remote stakeholders.
It is also important to provide details on…
-
What data is being backed up, for how long and why, along with the attendant costs.
-
Back-up frequencies, methods and redundancies.
-
How long it will take for data recovery and restoration in the event of a malicious or internal breach.
-
What happens to data collection if operations are able to carry on while the network is down – and how that gets incorporated later on.
Please check back with us in late January, for the next installment. In the meantime, we wish you happy holidays – ones that are cyber incident free!