July 15, 2015 By Kevin Beaver 2 min read

On any given day, in enterprises large and small, many decisions are made about information security. The decision-making that goes into running a strong program is critical. Some security decisions are made consciously by well-informed individuals. Others are based on assumptions — often half-baked information about the current network security posture.

Fear Impacts Decision-Making

In many situations, security decisions are based on fear:

  • The fear of losing a job or otherwise negatively impacting a career;
  • The fear of losing the respect of management and peers;
  • The fear of getting into trouble with auditors or the law.

This fear is a normal part of how we work as humans. In every choice we make, there’s either a desire for gain or a fear of loss. The problem is, I’m seeing more and more critical security decisions being made from this negative angle rather than from a positive perspective based on facts and common sense. Friedrich Nietzsche once said, “There are no facts, only interpretations.” Even so, too many decisions are based on misinformation at best or no information at worst. They’re often highly political and rarely in the best interest of the business. A lot of the time, money and effort are being wasted. Of all areas of business, information security is not the place to squander critical resources.

Every Decision Counts

Whether or not IT and security professionals will admit it, we humans are creatures of emotion. The common perception (especially in IT and security) is that people make decisions logically, but it’s actually just the opposite. People decide on things emotionally and justify them logically. Simply understanding how we operate can help tremendously when it comes to making your own choices and dealing with the decisions of others that impact your work.

Security improvements come from lots of small, seemingly meaningless decisions made with good intentions. Everything you do — or don’t do — in security counts. My favorite lyricist, Neil Peart of the band Rush, once wrote that if you choose not to decide, you still have made a choice. Some people bury their heads in the sand and don’t want to acknowledge their security problems, but that’s not for you.

Dig your well before you’re thirsty. Decide that you’re going to focus on making sound security decisions in the best interest of the business. Form a security committee. Work to get and keep others on your side. Lead by example. People all around you, from your executives to your users to your colleagues outside of the business, are continually framing their opinions of you based on your choices and how you deal with theirs. Fear is a natural part of how we all operate. Just don’t let it define you, your role or information security in your organization.

These issues are complex at the core, yet they’re simple to deal with. It’s up to you to make it happen.

More from Risk Management

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today