“Security is not a product but a process.”
- Bruce Schneier, Harvard Fellow and noted security expert
How often have we all heard sales pitches for products that claim they can provide protection against this or that or the other? Use this product, and you’ll lose weight, restore your receding hairline, or look twenty years younger. Blah, blah, blah.
As much as we want to believe these claims--I would particularly like to believe the hair restoration and youth claims—we know they’re not true. Just as these claims don’t prove out for those products, they don’t prove out for network security, either. The reason is the same: it’s not the product, it’s the process. Using a product can provide some benefit, but without a more comprehensive review and change to the related process, the product’s benefit will be limited.
This is exactly true with network security. As discussed in my recent Huffington Post article, 4 Signs of Cloud Security Hacks—and How Safe Networks Respond, SMBs should review their entire networks and security processes to better protect themselves—and their customers—against network attacks. For example, a SMB could have the best and greatest firewall, but if they fail to have a robust password security protocol, the firewall could be for naught. Indeed, lack of robust passwords can be the key threat to a network.
Hackers know human tendencies toward passwords and know that “password” is still among the most common passwords as is 123456, qwerty, 7777777 or 55555 (seven 7’s or five 5’s), and football. Or, for those that think ncc1701 (registry number for Star Trek’s USS Enterprise) is clever; sorry, that’s on the common list, too, as is 8675309 (Jenny’s number from the Tommy Tutone hit).
Call One is proud to offer comprehensive network security solutions that focus on both products and the process, to help SMBs better protect their networks, their business, and their customers.
And, by the way, if you’re using one of those commonly-hacked passwords . . ..
Read more about the cloud security process:
http://www.huffingtonpost.com/ed-wynn/4-signs-of-cloud-security_b_11305308.html?