The Consultant's Desk

The Consultant's Desk
Poring over the details on your behalf

Thursday, March 22, 2018

Finding the Right Security


The adage is "You get what you pay for." That is definitely a truism is many situations. However, sometimes what's paid doesn't match the quality of what's received. There needs to be analysis and comparison before a decision is made. This is even more true as we move into increased use of the Internet and cyber strategies. Hacking of company files in order to access records is not something novel. The most recent incidents involved hospital records as well as retaliation for an entertainment company's planned release of a new movie.

Also important is what the budget is with regard to the type and amount of security that is used. Budget for a Fortune 1000 corporation is going to be vastly different from that for a medium-sized company. And a SOHO or start-up is going to need something but faces the challenge of affordability.

Types of Threats

Before we get into affordability, budget, and the size of the enterprise, we need to start with the first step. There needs to be an analysis of what is considered a threat (and therefore a vulnerability). Perhaps it isn't a threat at all because there are already prophylactics in place that have good integrity. Then again, maybe there aren't. Besides that, who knows what's lurking out there in the great cyber-unknown. Some authorities say there are five types of vulnerabilities while others say there are as many as eight. It's important to pay attention to when these opinions were made. Over time, new issues arise and require different strategies to address them. Regardless of how many types of weak spots there are, it's important to develop good security protocols and adhere to them. The Cadillac of protection will be useless if best practices for use are not followed.

Evaluation

Now that the types of threats are known, now that the frequency of exposure is appreciated, it's time to consider what attributes your existing protection offers and whether it needs to be enhanced in some way. Things to consider are:

  • How reliable manufacturer is when it comes to providing support.
  • How often the software is updated.
  • What the reports and reviews have to say about the product.
  • How effective it's proven to be.
  • The size of your enterprise (number of employees, their locations, whether there are satellites in foreign countries).
  • Whether or not a back-up system is used.
  • There's this interesting thing called insurance against loss.
  • Of course, what's the budget.

Comparison

Now that all these matters are in the checklist and they've been honestly considered, it's time to compare the attributes of what's on the market. Is a Cadillac really needed or will a Chevy be satisfactory?

Execution

The analysis is completed. Comparisons are done. More informed than before. It's time to make a choice of purchase a new program or upgrade. Whatever the case at this point, whether paid or free, you should be fully aware of what's at stake and what you've bargained for.

Be Safe

This is no longer the early days of the Internet. There are perils in cyberspace that threaten our security at home, in schools, and in business. The more we rely on electronic devices to do things for us, the more important security is to our welfare. Should we consider some form of protection for the new frontier - artificial intelligence and self-driving vehicles? We can talk about that on another day. Just make certain you're safe wherever you are and while doing what you need to do.

Errata (March 23, 2018): One resource provided talked about "Top 5 Best Free Anti Virus Software." After further investigation, it was discovered that none of the programs are free. One offers a free, limited period trial. Another offers free mobile device protection as part of its product. Finally, another program includes free cloud storage. All five products come with a fee and varying terms that accompany payment terms.

Resources:

You May Also Appreciate:


No comments: