
If you want security, start with secure products
www.computerworld.com
While in thesepost-CrowdStrike daysit is reasonable to think one of the best ways to improve endpoint security in any business is toreplace Windows with Apple devices, thats just the starting point in a serious security journey.But its a pretty good starting point.Writing onLinkedIn, Google CISO Phil Venables recently drew attention to his companys latest cybersecurity report, which quite clearly makes a strong case for the need to purchase products that like Apples aresecure by design.If you want security, start with securityThereport explains:Organizations dont need more security products; they need more secure products.Thats one of the key takeaways from our new global cyber security survey. The research reveals that incremental security fixes no longer work. In fact, the more security tools an organization throws at the problem, the worse it gets.Supporting that argument, theres data:Organizations with 10 or more security tools endure 14 security incidents each year.Those with 10 or fewer such tools have to weather just six such events.82% of security decision-makers acknowledge the need to improve security measures.More than half admit that the complexity of modern work environments hinders their efforts.59% say reliance on outdated technology leaves them ill-equipped to handle future security needs.In other words, one way to halve the number of security incidents your company is exposed to is to rationalize spending on security tools, ensure those tools are effective in protecting the entire attack surface of company operations, and invest in computers, smartphones, and tablets that are secure by design.Such as those from Apple (and maybe even those from Google).Away with the cloudsYou might also considerrecent datathat suggests Google Cloud and AWS are more secure than Microsoft Azure and consider the value of your data as AI heads into the server farms and wraps itself around the globe. (I cant help but thinkApples Private Cloud Computecould eventually be a competitor in this space, too.)Most enterprise decision makers have heard all these arguments before.Facing rapid change, new technology deployments, and multiple waves of digital transformation, they arent just time poor, but budget-constrained. In those environments (which is most environments) it feels like the best decision is to continue managing more of the same.That means patching together mish-mash networks of systems and solutions and constant investment in teams to manage it all (and the ongoing costs of internal tech support for when those ad hoc systems inevitably go wrong).But on an increasingly unstable globe, we arent in Kansas anymore.The digital frontier is just as important a permiter as any geographical one, and the rising prevalence of nation state-backed attacks from all sides represent this. Business, every business, is now as compelling a target as any government entity in this brave new digi-world. And complacency will have (and is already having) huge impacts worldwide.Protecting your healthThe UKs National Health Service is afrequent victim of ransomware, for example. In part, this is because it remains heavily reliant onclapped out vintage computing equipmentdue to decades of ideologically inspired attacks against the integrity of the service.The truth is that UK infrastructure is pretty much a poster child for how to manage your digital platforms wrong.Complacency is a big part of that, with the nations National Cyber Security Center head, Richard Horne,about to warnthat the UK is unprepared for thelooming cyberwar(which some argue has already begun). Years of under-investment, a laissez-faire approach to security, and continued insistence on using legacy technologies have left the nations digital underbelly exposed.There is no room for complacency about the severity of state-led threats or the volume of the threat posed by cybercriminals,Horne plans to say. The defense and resilience of critical infrastructure, supply chains, the public sector and our wider economy must improve.Cyber-physician, heal thyselfWhile recommending a root-and-branch Mac migration might well seem to be an overly simplified diagnosis to the problem, it is a good starting point. After all, when did you last hear of a security incident impacting Apples systems puttingglobal business out of action?Never? Why is that?Because Apples products are secure by design.Thats not to say they are perfect.You must still put security policies and procedures in place, deploy secure endpoint management solutions, and ensure employees are fully up to speed with good security practices.Just because Macs havent fallen victim to a Windows-level cyberattack yet doesnt mean they never will, so you still need to have action plans prepared and rehearsed to go into effect on the day they inevitably do. But protecting your business by making such a migration is going to make a lot more sense as the cyberwars intensify.You need more secure platformsEven in the UK, IBM estimates the average cost of a data breach on UK businesses as $3.4 million, and while that does depend on the size of your enterprise, thats the kind of money that makes the seemingly higher one-off investment in a new platform seem aminor in contrast to the consequences of leaving yourselves vulnerable to attack through reliance on patched together solutions with so many built-in security weaknesses your top tech teams struggle to protect them.You dont need more security products. You need more secure platforms.Thats the bottom line.You can follow me on social media! Join me onBlueSky, LinkedIn,Mastodon, andMeWe.
0 Comments
·0 Shares
·88 Views