The adage is "You get what you pay for." That is definitely a truism is many situations. However, sometimes what's paid doesn't match the quality of what's received. There needs to be analysis and comparison before a decision is made. This is even more true as we move into increased use of the Internet and cyber strategies. Hacking of company files in order to access records is not something novel. The most recent incidents involved hospital records as well as retaliation for an entertainment company's planned release of a new movie.
Also important is what the budget is with regard to the type and amount of security that is used. Budget for a Fortune 1000 corporation is going to be vastly different from that for a medium-sized company. And a SOHO or start-up is going to need something but faces the challenge of affordability.
Types of Threats
Before we get into affordability, budget, and the size of the enterprise, we need to start with the first step. There needs to be an analysis of what is considered a threat (and therefore a vulnerability). Perhaps it isn't a threat at all because there are already prophylactics in place that have good integrity. Then again, maybe there aren't. Besides that, who knows what's lurking out there in the great cyber-unknown. Some authorities say there are five types of vulnerabilities while others say there are as many as eight. It's important to pay attention to when these opinions were made. Over time, new issues arise and require different strategies to address them. Regardless of how many types of weak spots there are, it's important to develop good security protocols and adhere to them. The Cadillac of protection will be useless if best practices for use are not followed.
Evaluation
Now that the types of threats are known, now that the frequency of exposure is appreciated, it's time to consider what attributes your existing protection offers and whether it needs to be enhanced in some way. Things to consider are:
- How reliable manufacturer is when it comes to providing support.
- How often the software is updated.
- What the reports and reviews have to say about the product.
- How effective it's proven to be.
- The size of your enterprise (number of employees, their locations, whether there are satellites in foreign countries).
- Whether or not a back-up system is used.
- There's this interesting thing called insurance against loss.
- Of course, what's the budget.
Comparison
Now that all these matters are in the checklist and they've been honestly considered, it's time to compare the attributes of what's on the market. Is a Cadillac really needed or will a Chevy be satisfactory?
Execution
The analysis is completed. Comparisons are done. More informed than before. It's time to make a choice of purchase a new program or upgrade. Whatever the case at this point, whether paid or free, you should be fully aware of what's at stake and what you've bargained for.
Be Safe
This is no longer the early days of the Internet. There are perils in cyberspace that threaten our security at home, in schools, and in business. The more we rely on electronic devices to do things for us, the more important security is to our welfare. Should we consider some form of protection for the new frontier - artificial intelligence and self-driving vehicles? We can talk about that on another day. Just make certain you're safe wherever you are and while doing what you need to do.
Errata (March 23, 2018): One resource provided talked about "Top 5 Best Free Anti Virus Software." After further investigation, it was discovered that none of the programs are free. One offers a free, limited period trial. Another offers free mobile device protection as part of its product. Finally, another program includes free cloud storage. All five products come with a fee and varying terms that accompany payment terms.
Resources:
- Hacking of Health Care Records Skyrockets, Tom Costello, NBC News (Feb.13.2016)
- Hospital network hacked, 4.5 million records stolen, Jose Pagliery, CNN Tech (August 18, 2014)
- After computer hack, L.A. hospital pays $17,000 in bitcoin ransom to get back medical records, Justin Wm. Moyer, The Washington Post (February 18, 2016)
- Texas Hospital hacked, affects nearly 30,000 patient records, Jessica Davis, Healthcare IT News (November 04, 2016)
- UCLA Health hacked, 4.5 million victims, Jose Pagliery, CNN Tech (July 17, 2015)
- Sony Hack Reveals Health Details on Employees, Children, Shannon Pettypiece, Bloomberg Technology (December 11, 2014)
- Sony Pictures attacked again, 4.5 million records exposed, Chester Wisniewski, Naked Security (02 Jun 2011)
Vulnerabilities
- Most Common Types of Network Security Breaches, M.S. Smith•edited by Jean Scheid, Bright Hub (updated: 3/28/2010)
- Security Breach Examples and Practices to Avoid Them, University of California Santa Cruz, Information Technology Services (revised November 2015)
- Common Types of Cybersecurity Attacks: A look inside the attacker's toolkit, Rapid 7
- The Top 5 Data Breach Vulnerabilities, Eric Basu, Forbes (Nov 5, 2015)
- Types of Cyber Security Breaches – What are the Most Common?, City Business Solutions (September 23, 2016)
Top Anti-Virus Programs
- The Top 5 Antivirus Software of 2018, The Top 5 Antivirus
- The Best Antivirus Software of 2018, Natural Intelligence Ltd.
- Top 5 Best Free Anti Virus Software, Best Anti-Virus Providers
- Best Antivirus for Mac - March 2018, The Top 10 Sites, Inc.
You May Also Appreciate:
- Get The Consultant's Desk on Kindle
- PHR/SPHR Recertification Exam
No comments:
Post a Comment