The Reality of Infosec Challenges: It's Not Just About Technology
Cash Register with mechanical pull. Photo - Me. Rye.

The Reality of Infosec Challenges: It's Not Just About Technology

When it comes to information security, many people assume that the biggest

challenges lie in the realm of technology - firewalls, encryption, and the

like. But the truth is, a significant portion of the problems we face in

infosec are actually rooted in non-technical issues.


For instance, something as straightforward as keeping track of which

assets belong to an organization can be a major hurdle. This may seem like

a simple task, but surprisingly, many companies struggle to maintain

accurate inventories of sensitive data and systems. Without this

information, it's impossible for management to make informed decisions

about security measures, leaving them vulnerable to attacks.


Another issue is the implementation of basic access controls - who has

access to what, and under what circumstances. This might seem like a basic

oversight, but it's astonishing how frequently organizations fail to

establish clear policies and procedures for managing user access. Without

strict controls in place, hackers can easily exploit weaknesses and gain

unauthorized access to sensitive information.


These non-technical issues highlight the complexities of infosec and the

need for a more holistic approach to security. By addressing these

fundamental problems, organizations can lay the groundwork for a stronger,

more effective infosec posture - one that goes far beyond just technology

alone.


Now that you've seen how non-technical issues can be major contributors

to information security challenges, what do you think is the most

important step an organization could take to improve its overall infosec

posture - and why?

Wesley Sorce

Marketing/Sales Expert/KOL

2 周

Appreciate the insights on information security! You’re absolutely right—while technology plays a crucial role, the human and operational side of security is often where the biggest vulnerabilities lie. In the food industry, we see a similar challenge: You can have the best ingredients, the latest kitchen tech, and a strong brand, but if the fundamentals—like inventory management, staff training, and clear operational procedures—aren’t dialed in, the whole system is at risk. The same applies to infosec. From my perspective, the most important step an organization can take to improve its overall security posture is building a strong security culture. This means ensuring every team member, from leadership to frontline employees, understands their role in protecting sensitive information. Just like a restaurant trains staff on food safety and customer service, companies need to train employees to recognize threats, follow access protocols, and take responsibility for security best practices. Without buy-in from the people handling the data daily, even the best tech solutions won’t be enough. What’s your take—how can companies make security awareness more engaging and effective for their teams?

Aldannuvia Dominguez

Vocational Instructor | USN Veteran |

2 周

Great article Rye! I think you touched on something that many people don't talk about. There are missing components within organizations that are a result of not thoroughly training employees. You might hire someone who knows how to use computers, but are you providing them training on social engineering attacks or acceptable use for the systems they are on besides just giving them a paper to sign at onboarding?

要查看或添加评论,请登录

Rye Whalen ??的更多文章

  • The Power of Peripheral Vision

    The Power of Peripheral Vision

    Embracing Adversity: A Skiing Analogy for Resilience As I reflect on my personal growth journey, I'm reminded of a…

  • Rural Access to Cycle Infrasturcture, Pima County

    Rural Access to Cycle Infrasturcture, Pima County

    Exploring Cycling Opportunities Are you interested in cycling as a mode of transportation or recreation? Understanding…

    1 条评论
  • The Cognitive Engine of Developer Problem-Solving

    The Cognitive Engine of Developer Problem-Solving

    Imagine a software developer at a midsize organization, embarking on a new feature project prioritized by her…

  • Understanding the "Account Operators" Group in Active Directory

    Understanding the "Account Operators" Group in Active Directory

    Active Directory Privileged Access Introduction The challenge of understanding the access privileges of various groups…

    2 条评论
  • Understanding the "Account Operators" Group in Active Directory

    Understanding the "Account Operators" Group in Active Directory

    Active Directory Privileged Access Introduction The challenge of understanding the access privileges of various groups…

    4 条评论
  • IMAGINATION WORKSHOP

    IMAGINATION WORKSHOP

    It’s October! This months theme is Imagination and in that vein, how can we be more imaginative in the work we do?…

  • MASTERING THE IMPLEMENTATION OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT

    MASTERING THE IMPLEMENTATION OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT

    Implementing security requirements effectively involves a structured approach encompassing several crucial steps. In…

    2 条评论
  • 5 Domains for a sense of place.

    5 Domains for a sense of place.

    This article discusses five different decision-making domains, each with its unique characteristics and approaches: 1…

    2 条评论
  • Debugging

    Debugging

    Complexity in System Performance? Complexity: Symptoms are often far removed from the root cause. Multiple Causes:…

    2 条评论
  • Authentication and Password Strength Guidelines

    Authentication and Password Strength Guidelines

    Authentication Solution and Sensitive Accounts? Do NOT allow login with sensitive accounts (used internally within the…

    2 条评论