Sunday, November 16, 2014

Proactive verse Reactive week 9

 We talk about visibility and the need to know yourself and looking past the horizon. IT security is about setting up controls to find indicators and be proactive toward those indicators. most organizations are reactive instead proactive causing them to fall behind eight ball every time there is an incident. I am not talking about reacting to every indicator cause different organizations have different volume of incidents. What I am addressing is the ability to have the information to accurately predict events, and taking proactive steps to alleviate the outcome.

There are many ways an organization can be proactive without hindering employee productivity. Security managers must walk a sticky tight rope between risk, productivity and protection. Most organizations would love to have a proactive approach toward risk management. Being able to identify the indicators and alleviate incidents before they happen.

Knowing your enemy is hard cause there are internet drive byes everyday. You must know yourself and think like an attacker. You should educate personnel instead of berating them when security issues occur. Violations of policies happen cause there was a change or the policy was never enforced by middle management. Educating personnel on what to look for and what not to do is a lot helpful than berating them. Remaining calm when problems arise is a good way not overcompensate. Organizations like to overcompensate when something happens to make sure you ready for the next threat. Remaining calm and not over reacting will allow you to analyze the problem and figure out a solution. When you over react and the overcompensate you can make your systems more vulnerable.

Pulling the plug on the internet and all systems is the only way to ensure complete security. This is not option cause the daily business operations rely on the internet and these systems to function. The best way to be proactive and react to indicators is to be an enable not an inhibitor. Working with the organization to come up with secure solutions that do not require blocking the whole system. Will help put security in a positive light and employees will mostly likely follow protocol. 

No comments:

Post a Comment