As I write this, it’s early March, and the wind is howling outside my window. We’ve just had several days of subzero weather. Caught in the grip of another Polar Vortex, New Year’s Resolutions, to live healthily, are a distant memory for many of us.
But while the cold weather may thwart our efforts to be healthier, that doesn’t mean you can’t improve the health of your IT organization before spring. Here are 6 bad habits that can compromise your IT security.
#1 Not admitting you need help
Too many IT leaders refuse to admit that they don’t know what they don’t know. This can be a relatively harmless habit, but not when it comes to IT security. Let’s say you’re migrating a workload to the cloud. If you don’t have an expert guiding your migration, you could be leaving workloads vulnerable.
#2 Not keeping an eye on things
Do you have someone actively monitoring your systems for signs of a cyber-intruder? The thirteenth annual Cost a Data Breach Survey by the Ponemon Institute, the average time to identification was 197 days. A lot of damage can be done in six and a half months!
#3 Ignoring the humans
In 2018, cybersecurity giant Symantec reported that phishing was by far the most used attack vector (71 percent) followed by a watering hole website (24 percent). You can implement the most sophisticated cybersecurity tools available, but if you don’t educate your employees on the dangers of clicking on unknown links, you’re leaving the door wide open.
#4 Not revoking credentials
Regulations such as PCI 8.1.3 require you to immediately revoke system log-in credentials when an employee leaves the business for any reason. Yet, the internet is filled with anecdotes from people who say they could access their former employer’s (or client’s) systems months after they’ve left.
#5 Silo thinking
We all know that silo-thinking is a problem for the organization as a whole. Yet, it is still rampant in many large IT organizations. One of the best examples is IT security and disaster recovery. The larger the organization, the more likely these two vital areas will be led by different people. However, in the most recent Cost a Data Breach Survey available from the Ponemon Institute, cyberattacks were the second leading cause of unplanned outages (22 percent). IT security and Disaster Recovery teams need to collaborate to protect the organization.
#6 Putting up with jerks
It’s more than a cliché. IT Security roles often attract people who struggle with human interaction. They can come across as anything from rude to arrogant, and without necessarily meaning to, they can make your non-experts feel stupid. IT security requires open communication and collaboration across many departments. You need to make it clear you won’t put up with poor behavior whether it’s coming from an internal employee or an outside vendor.
You could be less than 21 days from a stronger IT environment
Need help? Give us a call. say it takes about 21 days for a new and better behavior to become a habit. You can overcome all of these bad IT habits within that timeframe – sometimes even less. Our experts would love to discuss your IT security strategy and help you create a personalized plan for improving your IT security health.