Digital disruption and business security - are they compatible?
Keeping all the balls in the air during a transition to a digital disruption platform.

Digital disruption and business security - are they compatible?

We have been told digital disruption will change the world. In a number of ways, yes I think that is correct.  Where I see a problem is the simple fact that although digital disruption will change the face of business, cybercrime will not be far behind.  

Our adoption of digital disruption platforms has to be tempered with our protective business security practices.

We often forget the situation that brings digital disruption to the fore. 

The 2 most noticeable in the last 5 years have been:

  • Social media and the integration of social platforms into the business world. For communication, marketing, sales, inward bound information there have been substantial influences from these social environments.
  • The other is cloud-based technologies. The ability for SMEs to change from capital expense to operational expense can not be more highlighted with the adoption of cloud systems. It has allowed small organisations to compete against the giants of their industries.

In both cases the impact on business has not only been influential it has been cataclysmic. 

They have changed business itself!

What we forget though, where the people/business move to, the criminals will follow.

Initially, the introduction of any digital disruption platform is reliant on businesses taking the leap and impacting their business. Whether it is first to market (huge change) or a new business model (not so much) the people at the bleeding edge see a huge change. 

Financial, reputational or even systematic, these changes are seen by others as the way to go in today's business world. 

From there everyone else is now playing catch up. The more people who see the benefits in the change, the more organisations embrace the change. Embracing the change allows for more business to go through that platform. 

We eventually get to a position of saturation and once there these systems and platforms become targets of crime.

We rely on these digital capabilities to make our lives easier. The criminal elements rely on them to further their criminal enterprise and to make money off us in any way possible.

We have been programmed since the early 2000s to do stupid things in the digital world. From clicking on links in email all the way through to trust, everything has come about because of our lack of vision when we started using the internet for other than recreational purposes.   

I have had conversations with board members and C level Executives where they have got pretty heated over the fact that I do not include links in my email.  That is until you explain the reasoning to them.

Like the proverbial genie and pandora's box, we cannot put it back.  

We cannot go back, although many of us would love to.

If we cannot put it back we have to make a change for the better.  

How do we do that?

There are 4 fundamental strategies that everyone can deploy that will improve their security and make it harder for criminals to target them.  

These are cultural and attitude changes:

  • Trust no one - from the lowly receptionist to C level execs and board members, trust is something that has to be earned. It is also something that has to be constantly proven.
  • Get paranoid - everything we have is connected to the digital world - the internet. Because of this connection we are targets of cybercrime, nation-states, and even our own governments.  We have to be digitally paranoid to survive.
  • Increase awareness - watch what is going on around you, around your social media platforms, around the internet in general.  There are often reports in your social feed that could have an impact on you, your technology, your PII and your money.
  • Lie - forget what happens in the real world where lying is frowned on, one of the best things you can do in the digital world is to lie about information.  There are a number of places where you cannot lie (I.E. health, bank and government records) but all the rest are open slather.  The muddier the waters the better it is from a privacy and security perspective.

Digital disruption is driving the business world but it has to be tempered with our ability to ensure the security and privacy of the data no matter what. All digital projects need to be tempered with that requirement.







要查看或添加评论,请登录

Roger Smith的更多文章

  • Cyber Attacks Are Inevitable—Is Your Small Business Ready?

    Cyber Attacks Are Inevitable—Is Your Small Business Ready?

    What Does Cyber Resilience Mean for Australian SMEs?" Cyber resilience is more than just cybersecurity—it’s about…

    4 条评论
  • Blockchain Game-Changer or Just Another Risk?

    Blockchain Game-Changer or Just Another Risk?

    How Blockchain Enhances Data Integrity and Security In a world where data breaches and cyber threats dominate…

  • How Australian Businesses Must Respond to Data Leaks

    How Australian Businesses Must Respond to Data Leaks

    Immediate Steps to Take After a Data Breach A data breach can cripple an organisation, exposing sensitive information…

  • Security Without the Hassle

    Security Without the Hassle

    Benefits of Biometric and Token-Based Authentication Passwords are outdated. They’re forgotten, reused, guessed…

  • The Harsh Reality of Ransomware Attacks on Australian SMEs

    The Harsh Reality of Ransomware Attacks on Australian SMEs

    Why Ransomware Attacks Are Increasing Across Australian Businesses Ransomware attacks are surging across Australia…

  • AI vs. Cybercriminals - The Cybersecurity Battle of the Future

    AI vs. Cybercriminals - The Cybersecurity Battle of the Future

    How AI Detects and Prevents Cyber Threats Every second, cybercriminals probe networks, search for weaknesses, test…

  • From Trust to Threat

    From Trust to Threat

    Managing Cyber Risks with Vendors and Third Parties" As businesses rely more on external vendors and third parties, the…

  • Cybersecurity and the Law

    Cybersecurity and the Law

    Navigating Cybersecurity Compliance In today’s digital landscape, compliance with cybersecurity laws and regulations is…

    1 条评论
  • Beyond Passwords

    Beyond Passwords

    The Art of Crafting Strong Passwords In cybersecurity, your password is your first line of defense. For small and…

  • Strong Defenses Start with Smart Employees

    Strong Defenses Start with Smart Employees

    Empowering Your Team with Cybersecurity Awareness" In an era where cyber threats are a constant reality, your employees…

社区洞察

其他会员也浏览了