Aggressive Cybersecurity Strategy Offers Greater Information, Protection
When it comes to cybersecurity, there are two strategies. The first is reactive and is put into motion once security protocols have failed. The second, the proactive approach, can take you down the proverbial rabbit hole and into a world of intelligence gathering that puts you across the virtual table from those who might be coming for your secured data. At least this is how Alert Logic’s Stephen Coty described the strategy options to attendees of the 17th Cloud Expo.
The longtime cybersecurity expert warned that system breaches are not the only threats posed by those with access to sensitive information. He used the case of the recent Ashley Madison breach, in which the e-mails of users were compromised, as an example of how a bad actor could leverage an employee’s organizational data as a tool for blackmail. “It raises questions for us as security people. How do we get proactive about that?” Coty said. “We have to search those data dumps as quickly as possible when they come out because we need to know if we have any exposure out there.” While comprehensive security tools are considered a necessary best practice, they are often not enough to completely eliminate the threat of data loss without additional efforts.