Business technology is moving at an incredible rate. Applications, new software and improvements to existing infrastructure have, in some cases, completely transformed industries. But this has come at a price, as specialist roles have had to be created for security professionals in order for businesses to keep up. For small businesses or those without significant resources, things are far more complicated. In order to remain relevant, many organisations have had to improve their technology, and as a result, exposed themselves to potential breaches. Equally as important, physical security has often been overlooked in favour of technological advances, creating even more opportunities for criminal activity.
There have been numerous examples lately of businesses with faultless technology security being breached through the simplest of methodologies. Emails that shouldn’t have been opened, doors that should have been locked and comments that shouldn’t have been made have all led to disaster. The issue is vigilance and education.
While organisations need to be constantly improving their online security and enhancing their physical security infrastructure, it should be noted that the most successful virus of all time, wasn’t that clever at all. The ‘Love Bug,’ was released in the year 2000 and successfully infected tens of millions of computers around the world, not because it was a brilliant virus, but because the subject line said, “ILOVEYOU.” This simple phrase caused people to react emotionally, with security specialists, government agencies and world leaders all opening the email and corrupting their email server. 80% of all US Federal Agencies were impacted by the Love Bug.
Likewise, one of the most common corporate security breaches remains unlocked doors and poor physical security. Criminals have found that, with corporate security being so advanced, going low-tech is far simpler than spending millions of dollars on infrastructure of their own. Talking a cleaner into giving them access to a building, looking over someone’s shoulder as they use their laptop and a café, and simply dressing up as the person who services the printer are all common ways to gain access to privileged information.
Don’t let technology overtake common sense. Spend time thinking about how a criminal could gain access to your information, and then make sure your security protocols plug those holes.
If you want to learn more from the experts, click the link below