If all computers are vulnerable, how strong are your security defences?

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should lead you to a more defined choice of security controls.

You should also have a clearer idea of what you value most, but how are you going to protect it?

Your valuables should be central to what you build your security infrastructure around in order to protect your business from those who you believe potentially pose the biggest threat to your assets.

 

If all computers are vulnerable, how strong are your security defences?

The red triangles above represent the 'chinks in the armour' of your security controls. As long as humans create the computers we use; the computers we use will have vulnerabilities, bugs will exist and there will be weaknesses in your operating system. This is why all businesses are vulnerable.

Those who pose a threat to your business will try to exploit vulnerabilities in your security defences in an attempt to gain access to your most valuable assets. An example of this could be malware attempting to infect your computer or network through a vulnerability being unpatched.

Click here for a more in-depth analysis of particular security controls best suited to protect your assets from those who may be a threat to your business, depending on what assets you have.

Huw Tremlett

Data Management Consultant

Huw Tremlett