Should Your Business Follow Google’s Security Lead?

Should Your Business Follow Google’s Security Lead?

Google has introduced a new security strategy – but is it right for your business and something you should implement??

Google's strategy is to put some of its employees on a cyber diet, restricting their internet access to limit potential threats.

On the surface, it sounds like a smart move. Their approach can be likened to building a taller fence around your house to keep out burglars.

By reducing the internet connectivity of their workforce, they're effectively shrinking their digital footprint and making it harder for cyber criminals to find a way in.

But is it fool proof?

Well, no, not exactly.

While this strategy does limit external threats, it doesn't entirely eliminate the risk.

Visualise it this way... you've built a towering wall around your house, but your teenager leaves the back gate open. Similarly, internal systems could remain connected to other devices that can access the internet, providing a potential entry point for cyber threats.

In other words, you can't just focus on keeping things out.

Yes, there are very real threats from external hackers using all sorts of techniques like phishing, zero-day attacks, and malware etc. But the security industry often overlooks significant threats from within the perimeter.

Research shows that insider threats account for 62% of all security breaches. These insiders who could be disgruntled employees, careless staff, or malicious actors, often have legitimate access rights, intimate knowledge of the system, and can bypass traditional security checks. It's like having a burglar who knows where you hide your spare key.

So, what's the takeaway?

While Google's strategy has its merits, it's not a one-size-fits-all solution. Just as you wouldn't wear shoes that are too big, your business needs a cyber security strategy tailored to fit its unique requirements. A robust cyber security strategy should focus on both external and internal threats and have measures in place to mitigate risks from all angles.

Our advice? Instead of simply following in Google's footsteps, consider your own business's unique needs and vulnerabilities. And of course, if you need help with that, get in touch.

要查看或添加评论,请登录

Chris Pallett FBCS CITP的更多文章

社区洞察

其他会员也浏览了