Two Truths and a Lie: The Biggest Misconceptions in Cybersecurity

Two Truths and a Lie: The Biggest Misconceptions in Cybersecurity

By Bill Yates

The ongoing digital disruption has forced us to change the way we think about security. With the advent of a distributed workforce, the way we think about cybersecurity has changed.

Mark Porter, chief executive officer and president of High Wire Networks, spoke to the changing nature of the cybersecurity world in the MSP Cybersecurity Theater on the Expo Floor of the ITEXPO in Fort Lauderdale, FL, on Feb. 13.

Porter framed his discussion in the form of two truths and one big lie, in regards to cybersecurity in the age of the cloud.

Truth #1: Cybersecurity is a Business Problem

It’s not a technology problem, Porter says. Everyone knows they need cybersecurity. Security can be assured. People just don’t want to pay for it.

“There’s an overwhelming amount of choices out there today,” Porter says. Often, companies opt for what they can afford rather than what they need.

Porter recommends implementing proactive behaviors such as automated pathing. Instituting and adhering to a patching policy is paramount. The implementation of a rigorous patching policy “is the number one thing cybersecurity insurance companies look at,” Porter says.

Truth #2: The Workforce is Changing

Deal with the changing workplace, Porter says. There’s a tremendous shortage of skilled technology workers, with a deficit of nearly 2 million qualified bodies. Result: Not enough talent to process the data effectively, Porter says.

“Once you start gathering data, you have a tremendous responsibility to do something with it,” Porter says. Parsing network data for value is one of the duties that often gets left behind when there’s a shortage of talent.

AI can help alleviate the worker shortage. One option is to employ an XDR data mining platform that automates the threat hunting rules for you, he says.

The Big Lie: There’s an Easy Fix to Your Security Problems

There is no easy fix, Porter says. If anyone tells you that, walk away. Companies, partners and clients share information, but they all use it differently. Making sense of how everyone employs the data is one of the first steps to take when you’re trying to retain your grasp on your security.

There is no one-size-fits all solution. It’s all about applying the proper tool sets, he says. At Highwire, they require all their MSP partners to employ the tools sets they sell on their own network. Experience always pays, he says.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

Shining a Light on the Dark Web: Searchlight Cyber Debuts Comprehensive Hub

By: Greg Tavarez    3/28/2024

The Dark Web Hub is a one-stop shop for crucial context and continuously updated information on dark web marketplaces, ransomware actors, hacking foru…

Read More

Stellar Cyber and Trellix Bridge the Gap in Security Operations

By: Greg Tavarez    3/28/2024

Stellar Cyber announced the integration with Trellix Endpoint Security HX to allow customers to deploy more robust security solutions and improve thei…

Read More

CyberSaint Raises $21M in Series A Funding to Continue Securing its CyberStrong Customers

By: Alex Passett    3/27/2024

CyberSaint announced that it succeeded in a huge $21 million Series A funding round. This was led by Riverside Acceleration Capital (RAC) with other i…

Read More

US Education Receives Security Upgrade with Free Browser Protection Offered by Conceal, Carahsoft

By: Greg Tavarez    3/27/2024

Conceal and Carahsoft recently unveiled an initiative to fortify the cybersecurity infrastructure of U.S. educational institutions.

Read More

Cato's AI Takes Control of Security and Incident Response

By: Greg Tavarez    3/27/2024

With Cato's recently announced Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and conduct root c…

Read More