September 24, 2015 By Kevin Beaver 2 min read

Can you honestly say you understand your existing security posture? Many people, especially those in management, are quick to proclaim that no flaws exist; all is secure in their world because their auditors have said they’re compliant with whatever regulations or they passed their most recent spot check. But the reality of data breaches is telling us something different. Day after day, it seems, more breaches are occurring — all because of basic security flaws that could easily be prevented.

Security Flaws Are Everywhere

Today’s breaches are bigger, but they’re not necessarily more advanced. It seems that every major exploit is brought about by someone, somewhere, overlooking the security basics. This includes:

  • Weak passwords;
  • Missing patches;
  • Misconfigured operating systems;
  • Unencrypted laptops;
  • Untested Web applications;
  • Improper malware protection;
  • Untrained or uncaring users making their own security decisions.

I see these flaws in hospitals, universities, cloud service providers, state government agencies, manufacturing companies and seemingly every type of business in between. It’s not because I’m a security wizard with ninja-like skills. Instead, it’s because these problems are there, and I know where to look. They’re predictable and they’re everywhere. From large enterprises to small startups, these basic flaws (also known as the low-hanging fruit) know no limits, and continued research such as the Verizon Data Breach Investigations Report and ongoing studies from the Ponemon Institute, among others, underscores these very issues.

CISOs Need a Reality Check

Former IT executive James Champy once said, “Many executives are insulated from reality and consequently don’t know what the hell is going on.” I think this pretty much sums up the disconnection between IT and security teams and management.

Even with all the regulations, governance and lip service given to security in 2015, we still have these problems. Why, though? I know that most people in IT and security are doing the best they can with what they’ve got. Likewise, outside of the occasional IT leader guarding his own henhouse, I think executive management — even non-IT types — are doing the best they can to run the business. Yet the security basics are ignored and the breaches continue.

When are things going to change? What’s it really going to take to find, fix and prevent simple security flaws from creating such complex business problems? Is self-preservation and career perpetuation going to continue to drive decisions for some? Will lawyers intervene too much? Will users continue to do what they do?

No one knows the answers to how we’re going to minimize the challenges that are often politically induced. At least we do know the answers to the technical and operational side of things. Many such solutions are contained in the great book “Security, Accuracy, and Privacy in Computer Systems” by James Martin, which happened to be published over four decades ago.

As Ayn Rand, author of “Atlas Shrugged” and other works, said, “We can evade reality, but we cannot evade the consequences of evading reality.” The real solution is for those in leadership and decision-making positions to do what’s right and keep doing what’s right. Perhaps eventually things will come around. Whether or not they do, there’s lots of job security to go around. As long as you’re doing what you can to minimize your maximum regret — the seemingly inevitable breach — I think you’ll be just fine.

More from CISO

CISO vs. CEO: Making a case for cybersecurity investments

4 min read - Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets.For example, at RSA Conference 2024, a roundtable discussion about issues facing the cybersecurity industry, one CISO stated bluntly that budgets — or lack thereof — are the biggest problem. At a time when everything is…

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today