I find that accepting new truths often leads to a paradigm shift in the way that we manage our organizations and the way that we have to address new network security threats. Reading through this article, I find that there are many ways in which we need to start changing the way that we deal with our IT solutions inside of our companies – small and large alike.
A couple things really stood out to me when reading this article:
“BYOD has become BYOIT,” says Mike Meikle, CEO of secureHIM, a healthcare cybersecurity and education firm. “Employees can quickly stand up whole IT solutions, from applications to storage, with a few button clicks, and then access these platforms from their mobile devices.”
I remember when I was first starting in this industry back in the early 2000s, there was a huge focus on preventing this exact type of behavior. This idea of “shadow IT” was such a threat that it was almost all anyone talked about. Now, with BYOD having become such a big trend in workplaces, it seems that we really do have to redefine what that means.
“Everybody wants systems that are easy to manage and hard to breach,” he says. “But they usually end up with big ticket security appliances that are hard to manage and sensitive data that remains unprotected. A smarter approach is to assume your environment has already been compromised and design your security plan around that.”
I think that, in all of our talk about network security, this “we’ve already been hacked” approach is a good one. While we certainly all love to think of ourselves as having the ability to create the impenetrable network, there’s more value in the realization that it’s more than likely that you’re already compromised. Like the article says below – how secure is that USB drive that your co-worker just plugged into their desktop?
Wikimedia Sometimes the truth hurts. It can be hard to admit that you’ve lost control over how your organization deploys technology, or that your network is porous and your code poorly written. Or no matter how much bandwidth you’ve budgeted for, it never quite seems to be enough, and that despite its bright promise, the cloud isn’t the best solution for everything. In a world where anyone with a credit card and keyboard can spin up their own data center, it’s easy for CIOs to feel irrelevant and redundant. Good luck with all that. The gap between your dreams and cold hard reality just gets wider every day. That doesn’t mean you should give up, but it does mean you need to get real about what you can change and what you must accept. Here are six hard truths CIOs must learn to live with. [ Beware the 12 ‘best practices’ IT should avoid at all costs while heeding the 9 forces shaping the future of IT work . | Get an inside look at 13 real-world digital transformations . | Get the latest insights by signing up for our CIO daily newsletter . ] 1. Shadow IT has […]