Information Security, a long way to maturity

Publish date:

As an information security professional, I do my best in making things as secure yet user-friendly as possible. I would say the ultimate goal of security professionals should be to make use of IT intrinsically secure: users should be protected against damage caused by loss of availability or abuse of IT systems. Simply put: IT […]

As an information security professional, I do my best in making things as secure yet user-friendly as possible. I would say the ultimate goal of security professionals should be to make use of IT intrinsically secure: users should be protected against damage caused by loss of availability or abuse of IT systems. Simply put: IT should be idiot-proof when it comes to availability, integrity and confidentiality.

But boy, are we far from maturity. Today’s complexity still makes people use security as an excuse for all sorts of things. “I’ve been hacked” seems to be a popular statement by those trying to hide alleged criminal acts, which is wrong but understandable. It replaces something outright criminal by something less worse. The same for a more recent incident that caused a lot of attention. Again, a claim of being hacked to replace another action: human error.

I am sure criminals will continue to try and favor to replace their criminal acts by claims of being hacked, even if that means pleading guilty to bad computer maintenance. But I hope we’ll soon reach a statement where people will think twice before claiming ‘hacked’ when trying to replace human error. We should get rid of the idea that it is less bad to be hacked than to do stupid things on the Internet.

Related Posts

Cybersecurity

Is your Operational Technology (OT) environment insider safe?

Dan Leyman
Date icon September 8, 2020

Organizations need to exercise due diligence and care to ensure their vendors, contractors,...

Cybersecurity

Unlocking the power of AI and SOAR for end-to-end cybersecurity

Geert van der Linden
Date icon September 3, 2020

For AI to work effectively, organizations need to build a roadmap that addresses...

Cybersecurity

Identity access management (IAM) – the new normal

Dino Karanikas
Date icon August 27, 2020

Having an upgraded IAM plan in place will not only let you sleep better at night; it will...