False Technology Assumptions

My IT staff are ensuring that I'm secure

Perhaps,,,but perhaps not.  Depending on whether you have in-house IT support or an outside vendor, and the level of experience your IT support has may answer the question.  For in-house IT support, do you have a password policy, an Information Security Policy, an Incident Response Plan, a Business Continuity Plan?  If you don't know the answer, or the answer is "no" to any of these, then cyber security is probably not the most important task of their daily duties.  If your IT support is provided by a vendor, what is in your support agreement regarding Cyber Security?  

We ask these questions not to cast aspersions on your IT support, but to highlight one simple fact.  The priorities of IT support teams is to maintain availability of your systems and ensure your employees have access to these systems to do their jobs.  Many times, Cyber Security is a secondary task.

Do you know what security controls your IT support team has implemented?  Do you know if they are effective?  This is where we come in.

My Cloud Provider is Secure, so am I.

Using Cloud technology solutions from cloud based applications to having your entire technology infrastructure hosted in the cloud are very convenient and cost effective solutions for businesses.  Most Cloud providers employ state-of-the-art cyber security controls and procedures.  However, this is not a silver bullet.  On the contrary, you may still own some security responsibility that your cloud provider is not obligated to perform.  Also, your office environment connects to your Cloud based environment.  If you have a vulnerability in your office technology, it could be exposing your Cloud environment to cyber risks.  

Contact Us