By Mark Rasch
Security Evangelist
Verizon Enterprise Solutions
July 29, 2016
The biggest obstacle to building an effective information program at many institutions – particularly small and medium sized businesses (SMB’s) – is not a lack of resources, a lack of knowledge, or a lack of technology. Typically, the biggest obstacle is complacency. When meeting with senior corporate or government officials (in non-regulated environments) you will often hear expressions of concepts like “we would never be a target of hackers,” or “we don’t have anything anyone would want” or “we’re too small for anyone to care about.”
While the security demands of SMB’s are different from large government agencies or multinational corporations, the vulnerabilities are potentially more severe. SMB’s that suffer significant attacks may never recover – they may be forced to close up shop because of a ransomware attack, or because their clients and customers have lost faith and confidence in their ability to do their job or to protect their data. That’s why attention must be paid.
The answer to the “we don’t have anything anyone would want” argument is easy to address. Ask the question, “What would happen to my enterprise if… what would happen if the data I collected (including HR data, sales, costs, marketing, compliance, and strategy information) was no longer confidential.” And, as we have learned from the recent DNC hack, there’s much more in your information systems than you think – and much more potential damage from its release than you think. Company employees can be DOX’ed, targeted, harassed and otherwise attacked as a result of (or as the goal of) a data breach.
So the first step is a comprehensive assessment. But not the kind you’re likely thinking of. It’s not sufficient to assess your technology – how many servers, how many computers, how many ports open, etc. That’s a technology assessment. What you want to do is to assess the business impact of a potential breach as well. What are the critical systems AND the critical data in those systems – and why is it critical? When DNC officials were sending routine emails discussing strategy and tactics they probably didn’t consider these emails (or the email system on which they resided or were transported) to be particularly critical. And that points out another problem with how we typically prioritize security. We look at securing the device – the container – the transport channel, rather than looking to secure the information in it. We treat e-mail, for example as a system that needs to be secured, documents as another system, stored files as another, and so on. But e-mail is just a means for communicating. There are sensitive e-mails and non-sensitive e-mails. As a result, we either secure the trivial with a degree of security more reasonable for critical communications (a waste of resources) or secure the critical data at the level of the trivial security (vulnerability). More often, we do a bit of both. That’s why data classification and data segregation is also important; layers on layers of security. Even for SMB’s.
Security need not be prohibitively expensive. Nor need it be unnecessarily complex. But it should be done right to facilitate business. And at the end of the day, isn’t that why you are in business in the first place?