Security is expensive but have you tried implementing the basics?
I find it interesting that there are lot of basic things organizations should have in check before going after those expensive security tools but yea, “Security is expensive”.
Hello UG Readers;
I am back like I never left😊.
How are you? - You may not be able to respond but I am hoping you will genuinely tell yourself how you are doing and not the default “I am fine”.
It has been a stressful couple of weeks for me but I am still pushing - No be say I get choice sha 🤣
Now let’s talk about implementing cybersecurity been expensive or not.
Cybersecurity is expensive. Okay?
When people hear cybersecurity, the first thing that comes to mind for them is “Oh my God, I need to buy security tools”. I mean, you are not entirely wrong, but you are not entirely right either.
There has been a lot of conversations on how expensive cybersecurity is – No doubt, it is expensive, but have you maximised your current technology or solutions?
Okay, let me explain further.
I will use the mobile devices as an example.
Every organisation, small, medium, or large uses mobile devices to carry out their daily task or business. Mobile device here simply means your laptops, desktops, and all of that. One of the fundamentals of security is Confidentiality – Ensuring only authorised individual have access to systems or information.
A basic way to ensuring this (Confidentiality) for mobile device is enabling passwords.
Today, we still have businesses whose mobile devices are either not passworded or does not meet the basic password requirements (Not less than 8 characters, at least I lower case, upper case, numbers, and special characters). These businesses are also echoing “Cybersecurity is expensive”
“CAN WE PLEASE FOCUS ON OUR FOCUS FIRST?”
What you Should be Doing
Take inventory of all your current resources and tools.
Optimize your current tools and solutions.
Implement the best security practice using benchmarks like the CIS and it’s equivalent depending on the resource.
As an organisation trying to implement cybersecurity, the CIS controls is a great place to start.
I Co - Wrote an Article with my Mentee
If you follow me on twitter , you might have seen my tweets about IBK. Ibukun AKA IBK was one of my mentees for the CyberGirls 1.0 . IBK is a medical student who has shown what been committed to learning is.
We collaborated and wrote an article on Information Security in the Nigerian Health Sector. You should check it out here .
I am leaving you all with this “There is no exercise better for the heart than reaching down and lifting people up.”
― John Holmes