The security risk of technical debt

The security risk of technical debt

The subject of technical debt is an interesting one, a topic that is not discussed very often. So, what is it, and how does it create a security risk for your business?

When we talk about technical debt, the simplest analogy I can share is credit card debt. Yes, you can keep making minimum payments to keep your head above water; however, eventually, for many people, it can financially ruin a person. Technical debt has the same potential result for your business.

A great example of the definition can be found here thanks to Gartner.

As your debt continues to rise unnoticed, the result will eventually become very apparent. At the same time, it can be very expensive to resolve and will be due all at once!

Failure to address results in huge security gaps

Does your current IT partner deliver security assessments to evaluate your current security posture? If not, I recommend you have that discussion.

Ask anyone in the technology industry, and they will tell you that cybercriminals are investing heavily in their businesses.

With the increased use of AI technology and automation, together with increased penetration capabilities, the risk has never been greater. Let's take a look at some common items I see:

  • Legacy firewalls that should be replaced. Often without the appropriate security licensing and configurations.
  • Untested backup solutions that are no longer fit for purpose.
  • Old unsupported equipment such as legacy Windows Server OS, outdated desktop OS such as Windows XP, 7 etc.
  • No penetration testing.
  • Zero vulnerability assessments for the organization.
  • Complete lack of strategic planning and or budget.

So, whilst your email is working and things are seemingly good - they are not. You are as the saying goes an accident waiting for a place to happen.

Escaping the technical debt trap

Firstly, stop digging the hole. Technical debt represents not only a security risk but also impacts your business in so many other ways. From security to productivity, it represents a huge threat to your ability to serve your clients.

I recommend you begin with an assessment of your current situation. If your IT provider is truly proactive, obtaining that information should be simple.

Every review or assessment is a point-in-time snapshot, however. This is why I always recommend a penetration test at least yearly. That assessment should cover the entire organization, including remote workers if you have them.

Any debt can be resolved with a great plan to tackle it. However, the key is to know where you are and where you need to be. If you don't begin today, a cybercriminal might just come along and help you find it.

Securely yours,

Scott


Ken Stephens

Chief Security Officer / Chief Information Security Officer / Chief Privacy Officer

3 个月

Technical debt follows two paths. Unrecognized Risks and Unfunded Risk Reductions that are not undertaken for Profit, Bonuses, Stock Incentives or Institutional Biases. Unrecognized Risks come from People failures and/or lack of People to identify the Risk and Communicate them properly Unfunded Risk Reductions are most often just poor management decisions somewhere from Line Managers up the chain to Senior Corporate Officers and Board Members. Technical Debts are the results of a lack of Vision and/or a lack of Institutional Due Care. Insurance will not cover either going forward. Your stock price will.

要查看或添加评论,请登录

Scott Huxley的更多文章

  • vCIO Success: Building a budget (Part 2)

    vCIO Success: Building a budget (Part 2)

    A common question I would ask during a sales engagement was: 'Do you meet with your MSP quarterly?' The typical…

  • vCIO Success: The Relationship-First Foundation (Part 1)

    vCIO Success: The Relationship-First Foundation (Part 1)

    After nearly eight years in the MSP industry, progressing through roles from sales to vCIO and then leadership, I…

  • The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The other day, I experienced an AI taking my order at a drive-through. It did a great job, I must admit.

    3 条评论
  • The Danger of Doing Nothing

    The Danger of Doing Nothing

    Frequently within the IT industry, professionals are faced with the task of guiding customers or prospects towards…

    4 条评论
  • Yearly Penetration Testing: Ensuring Compliance and Mitigating Risk

    Yearly Penetration Testing: Ensuring Compliance and Mitigating Risk

    Having worked in this industry for some time, it is shocking how many companies have never had a penetration test…

  • Windows 10: Upgrade vs Replace?

    Windows 10: Upgrade vs Replace?

    Many clients and prospects still have aging machines that need to be updated to Windows 11. Pull a list from your RMM…

  • The Power of a Technology Roadmap

    The Power of a Technology Roadmap

    You wouldn't dream of heading out for a vacation without knowing where you're going, right? I mean, unless it was a…

  • Uncover Your Weaknesses Before Hackers Do

    Uncover Your Weaknesses Before Hackers Do

    As the saying goes, what gets measured gets done. So how good is your cybersecurity? Common answers I receive often…

  • I'm in love with Brad Pitt

    I'm in love with Brad Pitt

    To be clear here, I am not truly in love with Brad, though, I am sure he is a very nice person! You may have read a…

    2 条评论
  • The Alarming Rise of AI-Powered Cyberattacks

    The Alarming Rise of AI-Powered Cyberattacks

    We have seen plenty of discussion around the positive use of AI, such as automating manual tasks and summarizing large…

社区洞察

其他会员也浏览了