Can you honestly say you understand your existing security posture? Many people, especially those in management, are quick to proclaim that no flaws exist; all is secure in their world because their auditors have said they’re compliant with whatever regulations or they passed their most recent spot check. But the reality of data breaches is telling us something different. Day after day, it seems, more breaches are occurring — all because of basic security flaws that could easily be prevented.

Security Flaws Are Everywhere

Today’s breaches are bigger, but they’re not necessarily more advanced. It seems that every major exploit is brought about by someone, somewhere, overlooking the security basics. This includes:

  • Weak passwords;
  • Missing patches;
  • Misconfigured operating systems;
  • Unencrypted laptops;
  • Untested Web applications;
  • Improper malware protection;
  • Untrained or uncaring users making their own security decisions.

I see these flaws in hospitals, universities, cloud service providers, state government agencies, manufacturing companies and seemingly every type of business in between. It’s not because I’m a security wizard with ninja-like skills. Instead, it’s because these problems are there, and I know where to look. They’re predictable and they’re everywhere. From large enterprises to small startups, these basic flaws (also known as the low-hanging fruit) know no limits, and continued research such as the Verizon Data Breach Investigations Report and ongoing studies from the Ponemon Institute, among others, underscores these very issues.

CISOs Need a Reality Check

Former IT executive James Champy once said, “Many executives are insulated from reality and consequently don’t know what the hell is going on.” I think this pretty much sums up the disconnection between IT and security teams and management.

Even with all the regulations, governance and lip service given to security in 2015, we still have these problems. Why, though? I know that most people in IT and security are doing the best they can with what they’ve got. Likewise, outside of the occasional IT leader guarding his own henhouse, I think executive management — even non-IT types — are doing the best they can to run the business. Yet the security basics are ignored and the breaches continue.

When are things going to change? What’s it really going to take to find, fix and prevent simple security flaws from creating such complex business problems? Is self-preservation and career perpetuation going to continue to drive decisions for some? Will lawyers intervene too much? Will users continue to do what they do?

No one knows the answers to how we’re going to minimize the challenges that are often politically induced. At least we do know the answers to the technical and operational side of things. Many such solutions are contained in the great book “Security, Accuracy, and Privacy in Computer Systems” by James Martin, which happened to be published over four decades ago.

As Ayn Rand, author of “Atlas Shrugged” and other works, said, “We can evade reality, but we cannot evade the consequences of evading reality.” The real solution is for those in leadership and decision-making positions to do what’s right and keep doing what’s right. Perhaps eventually things will come around. Whether or not they do, there’s lots of job security to go around. As long as you’re doing what you can to minimize your maximum regret — the seemingly inevitable breach — I think you’ll be just fine.

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…