Avoid scare tactics and secure your data – on a budget
When I read news about the latest security breaches, one theme always stands out – they’re purposefully terrifying. Not only because the idea of intruders gaining access to private data can be unnerving, but because vendors, media, and even end users often resort to scare tactics when expressing the urgency of security incidents.
When you’re the person tasked with protecting your company from attack, you don’t need fear to drive your decisions; you need tangible solutions and strategies to help them stick. If Frank Herbert’s “Dune” taught us anything, it’s that “fear is the mind killer.” When you’re working with a tight security budget, which is the case for many midsize organizations, actionable plans become an even bigger priority.
To make security a reality for your organization, steer clear of the hype and focus on the below tactics:
1. Determine how your organization defines “security.”
Some small businesses equate security with surveillance cameras and locks on doors. On the other hand, global enterprises invest massive amounts of time and money championing antivirus and endpoint security software to keep intruders out of their systems.
There’s no cookie-cutter answer or playbook when it comes to security, but it’s critical to have a companywide understanding of what it means for your team. To arrive at that definition, consider the size of your security team, the types of data your organization collects and stores, and the state and cost of your security breach recovery plans.
2. Take stock of your sensitive data – and who has access to it.
At the heart of every data security plan is data itself. Don’t make the mistake of building taller walls and digging deeper moats without gaining a full understanding of the sensitive information your organization is actually storing; only when you can fully audit its contents will you be prepared to design an effective protection plan.
When you search for a file that you know contains intellectual property (IP) or personally identifiable information (PII), can you determine which employees have interacted with the information in the last year? What about the changes they made, the locations to which the file has moved, or whether a former employee or contractor saved the information to a personal location before leaving the organization? To negate the effects of a security breach, you first need to understand where they take root.
3. Build a case that will resonate with your C-suite.
IT and security professionals work up close and personal with their companies’ sensitive assets. To communicate the need for improved security plans to their executive teammates – without resorting to scare tactics – they need to get out of the weeds.
Don’t focus on details and downtime when you’re approaching an executive about a change to your security strategy. Instead, avoid technical jargon and focus on common ground that matters to IT pros and the C-suite alike: the company’s bottom line.
Is your team fully leveraging its data security expertise?1 Like