"
High-level cyber security strategy - IT Empathy ® Blog


IT Empathy ® Blog

https://www.itempathy.com/blog/index

High-level cyber security strategy.

Published: 27.02.2023
ITEmpathy

Introduction

There are really only two types of cyber security high-level strategy businesses can deploy to fight the cons while supporting the pros of innovations like artificial intelligence, Cloud Computing, IoT or 5G.


1. Proactive. (Uncommon)

1.1 Invest in high standards and controls upfront to squeeze significant risk down to residual risk. As in plug the holes and keep plugging new holes.

1.2 Balanced approach between innovation and cybersecurity efforts. As in, don’t sacrifice cybersecurity to adopt Swiss cheese innovation. But at the same don’t stifle the purpose of innovation with too much rope. Careful balance is required!

1.3 Has a budget agreed upfront based on risk levels involved. What assets are at risk? Brand protection etc.

1.4 Human centred approach as staff are the most significant risk. Build cyber efforts into staff culture. Help them help the company be more secure.


2. Reactive (common)

2.1 Results in knee jerk responses to cybersecurity incidents and last minute compliance struggles with audit requirements.

2.2 Consumes all your internal resouces and suppliers time and energy. Preventing projects and change.

2.2 Results in significant expense post, which is very likely to not have a current proactive budget.

2.3 Perceived as a headless chicken approach and unprofessional.

2.4 Risk of massive brand and reputationable damage.

2.5 Risk of financial ruin.

2.6 Manifests politics between teams creating blame cultures and silo communication in working environments as staff fight for survival.

2.7 Demoralises IT & cybersecurity staff.

2.8 Creates conflict when multiple things go wrong. Consuming executives limited time.

2.9 Leads to a high turnover of IT resources and suppliers.

2.9 Blocks strategic objectives.

2.11 It's a bad idea to be reactive with Cybersecurity👎.

Conclusion

For advice and support choose IT Empathy ® be your proactive IT strategic guide 👍. Get in touch via our contact page shown below.

 Thank you for taking the time to read this article.

Jon Bailey

Independent Consulting and Advisory

Copyright © IT Empathy Limited 2023 All rights reserved.

ITEmpathy_Logo

Cloud & Data Network Infrastructure | Cybersecurity | Technical Project Delivery | Unified Communications

ITEmpathy_Banner_1

Home Phone Email LinkedIn LinkedIn

About | Contact | Cookies | Privacy | Terms

© 2024, IT Empathy Limited. All rights reserved.

Registered in England & Wales, No. 10362337

itempathy-podcast

https://www.itempathy.com/podcast

IT Empathy ® Podcast

Podcast episodes

S1 EP11: Microsoft Cyber Signals and OpenAI

S1 EP10: Google Circle to Search

S1 EP9: Podcast Lessons

S1 EP8: Cybersecurity Strategy in the age of SaaS

S1 EP7: Business Startup Lessons

S1 EP6: What is IT Empathy?

S1 EP5: What are AI Deep Fakes?

S1 EP4: QR Code Cyber-attacks

S1 EP3: Platforms for innovation

S1 EP2: Innovation, Engagement and Communication

S1 EP1: Introducing the IT Empathy podcast


itempathy-logo-info

Extra Blog content

2023: There is opportunity in all problems. This leads to innovation!

2023: High-level Cybersecurity Strategy

2020: EPOS EXPAND 80T

2020: Amazon Distance Assistant Innovation

2018: NetApp ONTAP AI

2018: The Cybersecurity Yin and Digital Innovation Yang

2018: Why Is Corporate Internet Expensive?

2016: The Jenga Change Analogy