September 24, 2015 By Kevin Beaver 2 min read

Can you honestly say you understand your existing security posture? Many people, especially those in management, are quick to proclaim that no flaws exist; all is secure in their world because their auditors have said they’re compliant with whatever regulations or they passed their most recent spot check. But the reality of data breaches is telling us something different. Day after day, it seems, more breaches are occurring — all because of basic security flaws that could easily be prevented.

Security Flaws Are Everywhere

Today’s breaches are bigger, but they’re not necessarily more advanced. It seems that every major exploit is brought about by someone, somewhere, overlooking the security basics. This includes:

  • Weak passwords;
  • Missing patches;
  • Misconfigured operating systems;
  • Unencrypted laptops;
  • Untested Web applications;
  • Improper malware protection;
  • Untrained or uncaring users making their own security decisions.

I see these flaws in hospitals, universities, cloud service providers, state government agencies, manufacturing companies and seemingly every type of business in between. It’s not because I’m a security wizard with ninja-like skills. Instead, it’s because these problems are there, and I know where to look. They’re predictable and they’re everywhere. From large enterprises to small startups, these basic flaws (also known as the low-hanging fruit) know no limits, and continued research such as the Verizon Data Breach Investigations Report and ongoing studies from the Ponemon Institute, among others, underscores these very issues.

CISOs Need a Reality Check

Former IT executive James Champy once said, “Many executives are insulated from reality and consequently don’t know what the hell is going on.” I think this pretty much sums up the disconnection between IT and security teams and management.

Even with all the regulations, governance and lip service given to security in 2015, we still have these problems. Why, though? I know that most people in IT and security are doing the best they can with what they’ve got. Likewise, outside of the occasional IT leader guarding his own henhouse, I think executive management — even non-IT types — are doing the best they can to run the business. Yet the security basics are ignored and the breaches continue.

When are things going to change? What’s it really going to take to find, fix and prevent simple security flaws from creating such complex business problems? Is self-preservation and career perpetuation going to continue to drive decisions for some? Will lawyers intervene too much? Will users continue to do what they do?

No one knows the answers to how we’re going to minimize the challenges that are often politically induced. At least we do know the answers to the technical and operational side of things. Many such solutions are contained in the great book “Security, Accuracy, and Privacy in Computer Systems” by James Martin, which happened to be published over four decades ago.

As Ayn Rand, author of “Atlas Shrugged” and other works, said, “We can evade reality, but we cannot evade the consequences of evading reality.” The real solution is for those in leadership and decision-making positions to do what’s right and keep doing what’s right. Perhaps eventually things will come around. Whether or not they do, there’s lots of job security to go around. As long as you’re doing what you can to minimize your maximum regret — the seemingly inevitable breach — I think you’ll be just fine.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today