Skip to Main Content
[et_pb_section fb_built="1" fullwidth="on" _builder_version="4.4.9" background_image="" inner_width_tablet="50px" inner_max_width_tablet="50px" custom_margin="-75px|||" custom_padding="||||false|false" hover_enabled="0" z_index_tablet="500" locked="off" title_text="Calian Blog Header The reality of fighting a never-ending war with no borders"][et_pb_fullwidth_header title="The reality of fighting a never-ending war with no borders" subhead="By Bill Dunnion" text_orientation="center" background_overlay_color="rgba(0,0,0,0.3)" _builder_version="4.4.9" background_enable_color="off" custom_padding="100px||||false|false" hover_enabled="0"][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="4.4.9" hover_enabled="0" z_index_tablet="500" text_text_shadow_horizontal_length_tablet="0px" text_text_shadow_vertical_length_tablet="0px" text_text_shadow_blur_strength_tablet="1px" link_text_shadow_horizontal_length_tablet="0px" link_text_shadow_vertical_length_tablet="0px" link_text_shadow_blur_strength_tablet="1px" ul_text_shadow_horizontal_length_tablet="0px" ul_text_shadow_vertical_length_tablet="0px" ul_text_shadow_blur_strength_tablet="1px" ol_text_shadow_horizontal_length_tablet="0px" ol_text_shadow_vertical_length_tablet="0px" ol_text_shadow_blur_strength_tablet="1px" quote_text_shadow_horizontal_length_tablet="0px" quote_text_shadow_vertical_length_tablet="0px" quote_text_shadow_blur_strength_tablet="1px" header_text_shadow_horizontal_length_tablet="0px" header_text_shadow_vertical_length_tablet="0px" header_text_shadow_blur_strength_tablet="1px" header_2_text_shadow_horizontal_length_tablet="0px" header_2_text_shadow_vertical_length_tablet="0px" header_2_text_shadow_blur_strength_tablet="1px" header_3_text_shadow_horizontal_length_tablet="0px" header_3_text_shadow_vertical_length_tablet="0px" header_3_text_shadow_blur_strength_tablet="1px" header_4_text_shadow_horizontal_length_tablet="0px" header_4_text_shadow_vertical_length_tablet="0px" header_4_text_shadow_blur_strength_tablet="1px" header_5_text_shadow_horizontal_length_tablet="0px" header_5_text_shadow_vertical_length_tablet="0px" header_5_text_shadow_blur_strength_tablet="1px" header_6_text_shadow_horizontal_length_tablet="0px" header_6_text_shadow_vertical_length_tablet="0px" header_6_text_shadow_blur_strength_tablet="1px" box_shadow_horizontal_tablet="0px" box_shadow_vertical_tablet="0px" box_shadow_blur_tablet="40px" box_shadow_spread_tablet="0px"]

Remember the days when cyber security was nothing more than a firewall and some anti-virus software? Okay, perhaps just a little oversimplification, but for many companies those days did exist—and frighteningly enough some still do, but that's a different topic entirely. However, in 2020 and beyond, a few simple plug and play solutions are never enough.

My point here is that modern cyber security and the ever-present vigilance needed to keep companies, their people, and their data safe is nothing short of a war that never ends. And, as such, being at the ready is something that everyone needs to embrace, including those who seem to think that a firewall and anti-virus is enough—again I digress.

The most important factor to realize is that the complexity our modern infrastructures present—a fully connected world of data, apps, and access—has created a borderless world where it's now far more difficult to predict and thwart attacks.

Think of it this way. In the past, people protected themselves with forts: high walls and guards that could keep invaders at bay. The old idea of business and subsequent IT perimeters were no different. When everything resided inside the walls, a good firewall was for analogy sake a high stone wall, and your anti-virus and a few other tools were your guards. But what happens when those walls are taken away? No walls, no guards to guard the walls, hence no protection.

The issue now is that the perimeter is long gone. The castle walls have been traded in for small huts scattered around the countryside, the king's gold is stored everywhere a hut can be found, and the guards all left on vacation—this analogy is getting tired but you get the drift. From the introduction of the laptop, to the advent of the mobile phone, the creation of the cloud, and the adoption of Unified Communications (UC), the attack surface for cyber criminals is virtually endless.

Borderless IT has created the borderless warfront, and we are all now soldiers in the fight. This means that every device must be secured, every access point, every connection—the vulnerabilities are as endless as the data that we create every single day.

So how does one fight such a war? First, start with training your soldiers. Everyone in your company should be schooled in the art of cyber war—becoming skilled at spotting potential risks, understanding the importance of securing themselves as it pertains to devices, passwords, and connectivity habits, and so on.

Then, of course, there is your infrastructure. Just like in the military, not every soldier should have access to every plan and every state secret. Clearances are as important in the cyber world as they have been in the real world for centuries. This means that data and people should be matched through Privileged Access Management (PAM) on all fronts. And as people migrate from job to job, or when they leave the company, those privileges need to be changed and/or shut down immediately.

Now, let's not forget the data itself. Again, like the military, codes have been used to protect information. The same is true today when it comes to encryption. Making sure that data is encrypted in such a way that cyber criminals can't use it even if they were to get their hands on it, maintains a level of security needed to survive in today's digital world.

But that's not even close to covering all the bases. From how people connect to data, to the devices they have, to the tools used to continually scan anything and everything—the totality of your infrastructure from the largest servers to the very last USB key must be accounted for and monitored to ensure that the data contained is identified and kept safe from prying eyes.

Lastly, there is the constant vigilance needed to create a resilient stance to maintain and continually build upon the security defenses in place. Now, I’m by no means alluding to the idea that I have covered the thousands of possible cyber initiatives needed, this is just a blog after all.

The point here is to paint as vivid a picture as possible. A picture that explains the fact that we are all collectively fighting a never-ending war against cyber criminals. All silly medieval analogies aside, our castles are never safe from attack, all we can do is prepare in every way we can to hopefully win the battles as the never-ending war rages on around us.