Two Truths and a Lie: The Biggest Misconceptions in Cybersecurity

Two Truths and a Lie: The Biggest Misconceptions in Cybersecurity

By Bill Yates

The ongoing digital disruption has forced us to change the way we think about security. With the advent of a distributed workforce, the way we think about cybersecurity has changed.

Mark Porter, chief executive officer and president of High Wire Networks, spoke to the changing nature of the cybersecurity world in the MSP Cybersecurity Theater on the Expo Floor of the ITEXPO in Fort Lauderdale, FL, on Feb. 13.

Porter framed his discussion in the form of two truths and one big lie, in regards to cybersecurity in the age of the cloud.

Truth #1: Cybersecurity is a Business Problem

It’s not a technology problem, Porter says. Everyone knows they need cybersecurity. Security can be assured. People just don’t want to pay for it.

“There’s an overwhelming amount of choices out there today,” Porter says. Often, companies opt for what they can afford rather than what they need.

Porter recommends implementing proactive behaviors such as automated pathing. Instituting and adhering to a patching policy is paramount. The implementation of a rigorous patching policy “is the number one thing cybersecurity insurance companies look at,” Porter says.

Truth #2: The Workforce is Changing

Deal with the changing workplace, Porter says. There’s a tremendous shortage of skilled technology workers, with a deficit of nearly 2 million qualified bodies. Result: Not enough talent to process the data effectively, Porter says.

“Once you start gathering data, you have a tremendous responsibility to do something with it,” Porter says. Parsing network data for value is one of the duties that often gets left behind when there’s a shortage of talent.

AI can help alleviate the worker shortage. One option is to employ an XDR data mining platform that automates the threat hunting rules for you, he says.

The Big Lie: There’s an Easy Fix to Your Security Problems

There is no easy fix, Porter says. If anyone tells you that, walk away. Companies, partners and clients share information, but they all use it differently. Making sense of how everyone employs the data is one of the first steps to take when you’re trying to retain your grasp on your security.

There is no one-size-fits all solution. It’s all about applying the proper tool sets, he says. At Highwire, they require all their MSP partners to employ the tools sets they sell on their own network. Experience always pays, he says.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

MSP Expo Gold Sponsor ThreatLocker Strengthens Zero Trust Focus with $115M Series D Funding

By: Greg Tavarez    4/25/2024

ThreatLocker's recent announcement of a $115 million Series D funding round only highlights further the increasing demand for better endpoint protecti…

Read More

BreachRx Secures $6.5M Seed Funding

By: Stefania Viscusi    4/24/2024

BreachRx closed a $6.5 million seed round, led by SYN Ventures, with additional support from Overline.

Read More

Bigleaf Networks and NHC Partner to Optimize the Edge

By: Greg Tavarez    4/24/2024

New Horizon Communications Corp. (NHC) entered a strategic collaboration with Bigleaf Networks to offer network communications services to organizatio…

Read More

Secure the Everywhere Work Landscape: Ivanti Launches EASM and Platform Upgrades

By: Greg Tavarez    4/24/2024

The recently released Ivanti Neurons for External Attack Surface management, or EASM, helps combat attack surface expansion with full visibility of ex…

Read More

Trellix Teams Up with Google Chrome Enterprise for Protection Against Insider Threats

By: Stefania Viscusi    4/23/2024

Cybersecurity firm Trellix, known for its extended detection and response (XDR) solutions, has partnered with Google Chrome Enterprise.

Read More