Maintaining a Global Security Focus

Blog Date:  8/25/2016
Author:  Ray Coulombe

Cyber defense is a serious investment organizations are, or should be, making. But holistic management and organizational approaches often lag behind. Security models have grown organically over the years, but haven’t really adjusted to this new reality.

History shows that protecting assets has been primarily based around physical security, which does not sufficiently account for information assets. Assets were traditionally locked behind doors, walls, gates, and safes, not sitting unseen in a hard drives. Today, technology has enabled new ways, or vectors, for attacks to come from anywhere on the globe.

So what is to be done?

As a baseline, to combat global, cyber threats, information security and physical security must be incorporated in a coordinated counter strategy.

1. Streamline internal security operations
Cyber security programs should be integrated with physical security and based on common datasets, such as Active Directory, for needed authorizations to access information and gain entry.

2. Focus on all types of threats to enable rapid reaction
Security teams should support prevention of crimes regardless of its nature, whether its cyber, physical, information, social or insider-based. Policies and procedures should be known company-wide, with periodic training and testing. Enforce the belief that security is everyone’s business.

3. Create and sustain team spirit
Integrating formerly separate systems and teams is never easy. Clearly define the company process and security operations plan. Publish and discuss cyber security metrics prompting the team to stay oriented towards a cohesive goal.

4. Consider a crisis management team
Everything from natural disasters to terrorism to major disruptions in the supply chains can disrupt global company wellness. A crisis management team can help to mobilize support in local areas when disaster strikes. This should be based on a strong updated cyber and physical disaster plan.

5. Don’t ignore people and assets outside the facilities
Employees travelling away on business or visiting a local coffee shop with Wi-Fi present unique problems, whether they be personal safety or the security of information in their position. Have procedures for protecting both.

Other important assets no doubt exist within the company’s supply chain. Make this an integral part of the security planning process.

Through the integration of people, process, and technology, your company can maintain security holistically, and hopefully using your security investment in the optimal way.

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>