You Cannot Secure Your Data by Network Penetration Testing
divya
Thu, 03/09/2023 – 06:05
Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data that there continues to be a flaw in the cybersecurity industry’s approach to data security.
Misunderstanding or Misinformation
Typically, major data and privacy breaches are a result of either human error, or a successful external attack on users, devices, networks, or software. In fact, according to the recent Thales Data Security report, 52% of surveyed organizations have experienced a data breach in the past. This leads many in the cybersecurity industry to believe that achieving data security requires a systematic defense of attack vectors, no matter the cost or the results.
This concept of trying to defend every potentially exploitable asset as the most effective way to prevent serious data incidents is a fallacy that continues to this day. It is irrelevant whether there is deliberate exploitation of this misunderstanding by some in the industry, or whether this is simply an example of our inability to think outside the traditional approach to cybersecurity. The consequence of this misconception is that critical data and privacy information continues to be at risk.
Data security is just that… data security
If your organisation had a million dollars in cash, you would most likely want to keep it secure. No way would you simply sit it on a shelf in the office and rely on good strong front doors to your building, your security guard at the front desk, and perimeter alarms around the building to keep it safe. You would of course lock it in a very secure safe. Limit who has keys or codes to the safe to only those who needed to access the cash. Most likely protect the safe with a very good alarm system, and certainly have it monitored 24×7 with an appropriate response service that would react in minutes if an alarm went off.
If your organisation’s data is pot
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: