July 15, 2015 By Kevin Beaver 2 min read

On any given day, in enterprises large and small, many decisions are made about information security. The decision-making that goes into running a strong program is critical. Some security decisions are made consciously by well-informed individuals. Others are based on assumptions — often half-baked information about the current network security posture.

Fear Impacts Decision-Making

In many situations, security decisions are based on fear:

  • The fear of losing a job or otherwise negatively impacting a career;
  • The fear of losing the respect of management and peers;
  • The fear of getting into trouble with auditors or the law.

This fear is a normal part of how we work as humans. In every choice we make, there’s either a desire for gain or a fear of loss. The problem is, I’m seeing more and more critical security decisions being made from this negative angle rather than from a positive perspective based on facts and common sense. Friedrich Nietzsche once said, “There are no facts, only interpretations.” Even so, too many decisions are based on misinformation at best or no information at worst. They’re often highly political and rarely in the best interest of the business. A lot of the time, money and effort are being wasted. Of all areas of business, information security is not the place to squander critical resources.

Every Decision Counts

Whether or not IT and security professionals will admit it, we humans are creatures of emotion. The common perception (especially in IT and security) is that people make decisions logically, but it’s actually just the opposite. People decide on things emotionally and justify them logically. Simply understanding how we operate can help tremendously when it comes to making your own choices and dealing with the decisions of others that impact your work.

Security improvements come from lots of small, seemingly meaningless decisions made with good intentions. Everything you do — or don’t do — in security counts. My favorite lyricist, Neil Peart of the band Rush, once wrote that if you choose not to decide, you still have made a choice. Some people bury their heads in the sand and don’t want to acknowledge their security problems, but that’s not for you.

Dig your well before you’re thirsty. Decide that you’re going to focus on making sound security decisions in the best interest of the business. Form a security committee. Work to get and keep others on your side. Lead by example. People all around you, from your executives to your users to your colleagues outside of the business, are continually framing their opinions of you based on your choices and how you deal with theirs. Fear is a natural part of how we all operate. Just don’t let it define you, your role or information security in your organization.

These issues are complex at the core, yet they’re simple to deal with. It’s up to you to make it happen.

More from Risk Management

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Digital solidarity vs. digital sovereignty: Which side are you on?

4 min read - The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty.The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, positioning it as a counterpoint to the protectionist approach of digital sovereignty.What are the main differences between these two concepts, and why does it matter? Let’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today