IT Security: The State of Affairs

Almost daily we see another news article regarding a cyber security threat or data breach. Virtually everything is online. Unless businesses change their approach we will continue on the hamster wheel. 

The 2015 Data Breach Investigations Report by Verizon discovered that 70% of breaches could have been prevented. In addition, four of the nine patterns were caused by humans. 

IT security is a major issue that must be addressed from the top down. Businesses must develop and implement policies and procedures as well as educate employees on the importance. Phishing has become a popular method for attacking businesses. An email is sent to users with a hyperlink and/or attachment that infects the network. This type of incident could have been prevented simply by educating users. Businesses must create a culture of IT security to change the habits of users. Even though this is a daunting task it is achievable. 

The Australian Securities and Investment Commissioner Cathie Armour identified a three phase process for cyber security:

  1. Cyber risk identification – developing a risk register of cyber and privacy risks
  2. Cyber risk assessment – undertaking cyber resilience and privacy resilience reviews
  3. Cyber risk quantification developing and implementing a cyber incidence response plan

It is best to be proactive rather than reactive. Contact us today,, to learn how our IT Security experts can help you revolutionize cyber security in your organization so you do not become a data breach statistic. 


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s