Skip to Main Content

Superbe nouvelle! Nous migrons vers un nouveau site Web; au cours des prochains mois, vous pourriez voir un mélange de pages nouvelles et anciennes.

[et_pb_section fb_built="1" fullwidth="on" _builder_version="4.0.4" background_image="https://cyber.calian.com/wp-content/uploads/2019/12/Calian-Blog-Image-template-copy.012.jpeg" inner_width_tablet="50px" inner_max_width_tablet="50px" custom_margin="-75px|||" custom_padding="||||false|false" z_index_tablet="500" hover_enabled="0" locked="off"][et_pb_fullwidth_header title="Your Cyber Security products don't do anything" subhead="By Bill Dunnion" text_orientation="center" background_overlay_color="rgba(0,0,0,0.3)" _builder_version="4.0.4" background_enable_color="off" custom_padding="100px||||false|false" hover_enabled="0"][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="4.0.4" z_index_tablet="500" text_text_shadow_horizontal_length_tablet="0px" text_text_shadow_vertical_length_tablet="0px" text_text_shadow_blur_strength_tablet="1px" link_text_shadow_horizontal_length_tablet="0px" link_text_shadow_vertical_length_tablet="0px" link_text_shadow_blur_strength_tablet="1px" ul_text_shadow_horizontal_length_tablet="0px" ul_text_shadow_vertical_length_tablet="0px" ul_text_shadow_blur_strength_tablet="1px" ol_text_shadow_horizontal_length_tablet="0px" ol_text_shadow_vertical_length_tablet="0px" ol_text_shadow_blur_strength_tablet="1px" quote_text_shadow_horizontal_length_tablet="0px" quote_text_shadow_vertical_length_tablet="0px" quote_text_shadow_blur_strength_tablet="1px" header_text_shadow_horizontal_length_tablet="0px" header_text_shadow_vertical_length_tablet="0px" header_text_shadow_blur_strength_tablet="1px" header_2_text_shadow_horizontal_length_tablet="0px" header_2_text_shadow_vertical_length_tablet="0px" header_2_text_shadow_blur_strength_tablet="1px" header_3_text_shadow_horizontal_length_tablet="0px" header_3_text_shadow_vertical_length_tablet="0px" header_3_text_shadow_blur_strength_tablet="1px" header_4_text_shadow_horizontal_length_tablet="0px" header_4_text_shadow_vertical_length_tablet="0px" header_4_text_shadow_blur_strength_tablet="1px" header_5_text_shadow_horizontal_length_tablet="0px" header_5_text_shadow_vertical_length_tablet="0px" header_5_text_shadow_blur_strength_tablet="1px" header_6_text_shadow_horizontal_length_tablet="0px" header_6_text_shadow_vertical_length_tablet="0px" header_6_text_shadow_blur_strength_tablet="1px" box_shadow_horizontal_tablet="0px" box_shadow_vertical_tablet="0px" box_shadow_blur_tablet="40px" box_shadow_spread_tablet="0px"]

In today's commodity-driven world, our collective society is constantly told what to buy: quick purchases that can solve all our problems with a single product. It's literally what the advertising industry is built on. Whether it's a quick-fix, money-making scheme, a new weight loss product, the latest in fashion trends—every product promises something nothing short of miraculous.

The question: Is the cyber security world any different? It's always easy to sell point solutions to address the challenge of the day, but as I've alway said about point solutions—it's not polite to point. Thinking that a single product will suddenly protect an organization from an army of cyber attackers just isn't feasible.

In our new world of always on and always connected, so too are the nefarious individuals who are constantly in the shadows trying to infiltrate every system possible: people behind the keyboards running the scams and taking advantage of everything they can. So if people are at the heart of the problem, so too must people be at the heart of the solution.

Like any business process management endeavor, there first needs to be a profound account of everything from corporate culture, to how people work in groups and the associated systems needed for divisions to do their jobs, how those systems and groups interact with other systems and groups and, of course, how individuals ultimately interact with other individuals and systems.

In short, placing people at the forefront of any cyber security solution is essential for success. It's at this stage where an intrinsic understanding of how people interact with each other and the organization creates the road map to success. Furthermore, it also creates the perfect opportunity to enable input from teams and individuals to ensure that new security measures don't actually hinder business—yes, that can happen.

By involving people in the initial phase of the project, educational factors can be addressed along with best practices, and more. Simply put, when everyone knows what is happening and is involved and engaged, the next step becomes far easier to implement and manage.

Once the human equation is addressed, the next logical phase is creating the process. By leveraging stage one findings—the human factors of business—processes become very clear as to what will work and, more importantly, what won't. And, again by garnering people's input early on, the mass adoption of new processes becomes far easier, eliminating everything from the simple ignoring of process, to the more dangerous aspects of bad or cumbersome processes that foster issues such as rogue IT.

Lastly, there is the product aspect of the entire initiative. Once the people and process aspects are solidified, choosing the right product becomes easy. It's simply a matter of best fit. And whether that’s based on something as simple as feature / function, to interface, and more, all of the heavy lifting as to what will work best has already been done. To put it simply, the people have spoken.

As the title of this article states, cyber security products don't actually do anything until configured properly to address people, process, and business needs. The idea of plug and play in any realm is never a good approach to solving a problem. But when the trifecta of people, process, and product is addressed in an appropriate manner and sequence, it's amazing what can be accomplished.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]