Cybersecurity: Strategies and Techniques
Data and network security spending is rarely at the top of any business purchaser’s list of items to buy. It doesn’t improve productivity, it doesn’t add to the bottom line, so they settle on the least they can get by with. Feeding into this complacency are several misconceptions:
- That hack attacks are targeted: “Why would someone go after me?”
- That the data would be of no use to anyone else: “I don’t have any secrets / What could a hacker possibly do with data on my computer?”
- That if something happens, someone out there will fix it
- "We already follow our industry standards" (there are no cybersecurity standards, just recomendations)
It is precisely this mindset that hackers exploit. US businesses leapt into the Internet age, embracing its technology for exchanging information and increasing efficiencies, but giving little thought to its vulnerabilities. This type of approach is akin to engaging in a dangerous sport or activity, all the while convincing oneself that there is nothing nothing to be concerned about.