<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699785206826853&amp;ev=PageView&amp;noscript=1">

Cyber Security Awareness is Best Offensive Security Strategy

Posted by Keith Hannah on Mar 9, 2017 12:09:08 PM

Security Specialist

Find me on:

Companies are fighting a cyber security war against highly arranged antagonists. Corporations still approach cyber security with a rigidly defensive mindset. They operate under the idea that having the safest defense will keep them safe from advanced rivals. But assailants understand how to break any defense, guaranteeing they will finally infiltrate a corporation. Businesses need to approach security by thinking about how they can stop an offensive attack. How is this different from having a robust defense? When you are stopping the attack, you do not stand on the sidelines waiting for an assailant to break your network, praying that the safety measures you have in place will be adequate to stop them. To stop an offensive play, you turn your people into offensive warriors: rather than protecting about your defensive weaknesses, you keep an eye open for the attacker's weak points and go after them to shut them down before they become a problem.

Cyber security human firewall

 Fundamentally, you work out the way in which the enemy is working and use this to your benefit, an idea I call "human firewall” and according to IBM 70 percent of your cybersecurity risk is related to people. Stopping the attacker's offense will permit corporations to manipulate the hack before the opponent has hacked your company and then begins to make the rules. Think about your IT environment as a battleground that you wish to protect and use to your benefit. The ideal battleground protection consists of using 30% effort and capital towards hardware point systems and the 70% balance toward your "Human Firewall" capacities. A great human firewall tool is the Securable.io Perimeter cybersecurity system. Hopefully, you know what regular activity looks like on your network and have enough visibility into your environment to cover your point systems risks, which is 30% of your exposure. Spend the rest of your offensive time working with your man-made Firewall. With this point of view, you will know when things look nefarious and spot the hacker's actions. Having visibility into your IT environment and having the ability to turn your people into offensive weapons is imperative for stopping the attacker's offense. 

 Organizations must consistently perform reconnaissance in their surroundings and collect info and research it in real-time. With this information, a firm can control the situation rather than permit the hacker to dictate what occurs. Remediating threats to security one at a time will not do anything to guard an enterprise. If anything, this strategy tips hackers off that they have been discovered and supplies them with time to redo their plan and work out the way to dodge your defenses.

 Information Technology departments staffed with unskilled security resources do not approach security issues with an army like mindset. They tend to look at situations on a case-by-case situation and do not deliberate over how to use an IT environment to close an adversary's operations. Security roles staffed with employees who've some security background. Security people tend to approach the topic as a physical problem, a point of view that tends to be missing from current thinking perspectives around the right way to stop advanced cyber-attacks.

 For most companies, cybersecurity stops and ends at their PC’s and servers and not connected to physical security. However, in truth, the bounds between cyber and physical security are vanishing. Hospitals have reported many stories about how simple IOT medical devices get hacked. The correct battleground approach permit firms to manage the hack rather than allowing the enemy to make the rules.  A real battlefield plan where the emphasis is on the Human Firewall” is a clear strategic winner. And remember techniques employed by the law enforcement are still valid in cybersecurity.


Let Securable Protect You



WATCH: Are you creating a culture of cybersecurity?




More information cybersecurity survival guide

 keywords: security training, social engineering, data loss prevention software, phishing, cyber security news, cyber security insurance. human firewall training, offensive security

Topics: Cybersecurity, digital footprint, Human Firewall, cyber security training, cyber awareness training, Employee security, IT Security, Social Engineering Toolkit, Security Training, security awareness training

Keith Hannah

Written by Keith Hannah

Security Specialist