"
The Cyber Security Yin and Digital Innovation Yang - IT Empathy ® Blog


itempathy-logo-info

IT Empathy ® Blog

https://www.itempathy.com/blog/index

The Cyber Security Yin and Digital Innovation Yang

Published: 01.04.2018
The Cyber Security Yin and Digital Innovation Yang

The ubiquitous yin-yang symbol used in this article requires special credit, acknowledgment, and respect to the ancient wisdom of the Taoism/Daoism, a Chinese religion and philosophy.

Introduction

There is much talk about the need to innovate or die in these modern digital times. This is partly true, but missing the other equally critical defence to your digital Innovation attack, being your Cyber Security.

Therefore, I abstractly propose analogistically looking at the principle of Yin and Yang. This is a fundamental concept in Chinese philosophy and culture. Being that all things exist as inseparable and contradictory opposites, for example, female-male, dark-light and old-young and now digital innovation, and cybersecurity.

Digital Innovation

(Yang)

Gartner defines innovation management as a business discipline that aims to drive a repeatable, sustainable innovation process or culture within an organization. Innovation management initiatives focus on disruptive or step changes that transform the business in some significant way.

Most businesses focus on digitally enabled innovation. Opting for the discovery of new ways to disrupt the competition and gain a competitive advantage. This creates an urgency to develop at rapid speed. It seems virtually everyone seems to want to migrate to the Cloud and build a mobile app for every requirement going. This is great as this does enable businesses to innovate. However, at the same time the ongoing protection of this innovation can be overlooked.

Cyber Security

(Yin)

The more we innovate the more risks we accumulate. The mitigation of these risks requires Integrated Risk Management (IRM) and a multi-layered defence strategy. The shift to mobile first innovation and online cloud services, means Mobile Security and Cloud Security solutions must be deployed to protect your mobile workforce. This is a key area for businesses to get right. The urgent need and opportunity to proactively defend our digital innovations from endless known and unknown threats using Zero Day Cyber Security solutions

Balanced by Design

| Connectivity | Interoperability | Mobility | Operability | Portability | Producibility | Simplicity | Usability | Risk Management | Privacy by Design | Security by Design |

Conclusion

Find an equal balance with your Yang Digital Innovation (attack) and Yin Cyber Security (defence). Simply find The Yin and Yang.

Thank you for taking the time to read this article. If you need assistance with Cybersecurity solutions please reach out via our contact page shown below.

Jon Bailey

Independent Consulting and Advisory

Copyright © IT Empathy Limited 2018 All rights reserved.


ITEmpathy_Logo

Cloud & Data Network Infrastructure | Cybersecurity | Technical Project Delivery | Unified Communications

ITEmpathy_Banner_1

Home Phone Email LinkedIn LinkedIn

About | Contact | Cookies | Privacy | Terms | Testimonials

Blog | Learn | Podcast


© 2024, IT Empathy Limited. All rights reserved.

Registered in England & Wales, No. 10362337


itempathy-podcast

https://www.itempathy.com/podcast

IT Empathy ® Podcast

Podcast episodes

S1 EP11: Microsoft Cyber Signals and OpenAI

S1 EP10: Google Circle to Search

S1 EP9: Podcast Lessons

S1 EP8: Cybersecurity Strategy in the age of SaaS

S1 EP7: Business Startup Lessons

S1 EP6: What is IT Empathy?

S1 EP5: What are AI Deep Fakes?

S1 EP4: QR Code Cyber-attacks

S1 EP3: Platforms for innovation

S1 EP2: Innovation, Engagement and Communication

S1 EP1: Introducing the IT Empathy podcast


itempathy-logo-info

Extra Blog content

There is opportunity in all problems. This leads to innovation!

High-level Cybersecurity Strategy

EPOS EXPAND 80T

Amazon Distance Assistant Innovation

NetApp ONTAP AI

The Cybersecurity Yin and Digital Innovation Yang

Why Is Corporate Internet Expensive?

The Jenga Change Analogy