No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Is Your Cybersecurity “Too” Good?

May 18, 2023
in Protection
0
Do You Really Need a CISO?


Emphatically, no, it isn’t. But now that we have your attention, is that even the right question? Probably not. Your security can never truly be “too good”; conversely, neither can it be “too poor,” though it is possible to have “bad” security (more on that in a moment). If security is addressed in binary modes, there is a good chance the apparatus has been designed in isolation from other functions and processes.

If you have a problem with your security, it’s not that it’s “too good”. Rather, the issue likely lies with your risk management plan. Therefore, the “right” question is: Is your security apparatus aligned with your operational needs, risk tolerances and business resources?

“Remember That Time When…?”

Almost every person reading this article has run into an information security technical challenge. The challenge could have come during onboarding and setting up accounts, such as an authentication step failing. Or it may have come during a device switch where some management system prevented new hardware from accessing resources.

There is always a reason — usually a good one — for a security hiccup, but that hiccup takes valuable time from other business needs. Sometimes, luck intervenes and a quick call to the help desk resolves it. Other times, your device ends up bricked and it is workaround-city until the new kit arrives.

We all have a story. And if you are in the information and cybersecurity spaces, the reasoning behind the security measures causing the issues can be easy to defend. But CISOs and other security and information officers have different interests from other users who just want to get their jobs done — jobs that are probably not security-related.

The Necessity of Risk Management

Information and security officers have a simple mandate: secure the organization’s information and technology assets. But successfully delivering on their mandate is contingent on understanding operational and business driver requirements. And because business delivery has changed so much over the last 10 to 15 years, virtually all aspects of an organization’s business are integrated into, or dependent on, technology.

Need a retail payment processed? It’s likely going through an app. Need to access a document? It’s probably sitting with a cloud service provider. Need to analyze some data? There’s a good chance artificial intelligence is part of the process.

Do not forget, all of those functions happen over the internet: just another third-party service in the mix. If you are not asking, “Can we operate without an internet connection?” you are missing the boat in your planning. And if the answer is no, you better be sure to have some up-to-date and tested business continuity and disaster recovery plans.

The ability to do anything offline now is so increasingly low that information security leaders need to continually ask, “What operational impact are the security measures causing?” Three buckets to consider:

  • Security measures cause irregular inconveniences to users. This is a good place to be.
  • Security measures cause regular annoyance to users. Not the best, but not the worst.
  • Security measures result in constant prohibitions. Here, users cannot successfully complete their work. An organization in this situation is not doing well.

An organization in the last bucket is likely suffering from business and security functions not talking to each other, or if they are, they are not understanding each other. Moreover, it’s likely that risk assessments are being done in silos, or worse, that those risks are not well understood.

Mandatory Requirement: The Risk Acceptance Process

Assume for a moment the organization has understood its risks and completed informative assessments. Leadership has well-defined risk tolerances and the organization even has a very security-minded culture and workforce. Could an organization still trip up? Yes, if they do not have a formalized risk acceptance (or exception or exemption) process.

Consider this scenario for a moment: an organization makes a risk management decision that all traffic must pass through a VPN, prohibiting all other device connections. On the surface, this appears reasonable, but it also means an active internet connection is required. Now, imagine this same organization has a comparatively small business unit that often does work in remote areas where internet connections are not stable or unavailable.

Do you see the problem looming?

This is a scenario where the risk acceptance process is vital to operations. Business and security leaders need to come to an arrangement and document the risks, management, outcomes and recovery steps from potential fallout.

In this scenario, users could receive “remote only” devices with different configurations, such as restricted or segmented access when they do go online, limiting the potential blast radius if something goes wrong. This is a technology workaround.

Or perhaps the risks are too great and a process workaround is used. For example, users are expected to use manual tools while unable to connect and then transfer their work product when online. If this is the route to take, business leaders need to build in the operational lag this scenario could cause. All the more reason to encourage buy-in from everyday users.

Avoiding the Road to “Bad” Security

We began with the question of whether your security could be “too good”. Chances are, you will never run into that situation. But you can certainly run into a “bad” security situation, likely as a result of mismatched operational and security needs. You can avoid this situation through sound risk management practices, but more importantly, by working with businesses and operations to learn their needs.

Senior Director, Educator and Author

George Platsis is a business professional, author, educator and public speaker, with an entrepreneurial history and upbringing. Experience areas include ente…

Editorial Team

Editorial Team

Related Posts

What Are Stabilizer Muscles (and Do You Really Need to Train Them)?
Protection

What Are Stabilizer Muscles (and Do You Really Need to Train Them)?

April 2, 2026
The Eufy ExpertSecure System E10 Is $100 Off Right Now
Protection

The Eufy ExpertSecure System E10 Is $100 Off Right Now

April 2, 2026
Fitbit Might Be Making a Whoop-Like Smart Band
Protection

Fitbit Might Be Making a Whoop-Like Smart Band

April 2, 2026
You Don’t Have to Update to iOS 26 to Protect Your iPhone From DarkSword Malware
Protection

You Don’t Have to Update to iOS 26 to Protect Your iPhone From DarkSword Malware

April 2, 2026
You Can Play This 'Hidden' Game in Your TikTok DMs
Protection

You Can Play This ‘Hidden’ Game in Your TikTok DMs

April 1, 2026
After a Few Months, I'm Loving My Hisense QLED CanvasTV, and It's 40% Off Right Now
Protection

After a Few Months, I’m Loving My Hisense QLED CanvasTV, and It’s 40% Off Right Now

April 1, 2026
Load More
Next Post
Walmart, Alibaba, Cisco, Take-Two, and More Stock Market Movers

Walmart, Alibaba, Cisco, Take-Two, and More Stock Market Movers

Popular News

  • Bitcoin

    Bitcoin Price Is Only Halfway To The Bottom And Will Crash Below $40,000, Here’s Why

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews

    0 shares
    Share 0 Tweet 0
  • Best cash Isa savings rates: Easy access and fixed deals in our tables

    0 shares
    Share 0 Tweet 0

Latest News

Trump's 'no tax on overtime' deduction is a 'home run,' Treasury says

Trump’s ‘no tax on overtime’ deduction is a ‘home run,’ Treasury says

April 2, 2026
0

Jetta Productions Inc | Digitalvision | Getty ImagesMany Americans are seeing bigger tax refunds this season due to President Donald...

Sui-based Nemo Protocol exploited for $2.4m

Drift Protocol’s $285m hack exposes social engineering threat to Solana DeFi

April 2, 2026
0

Drift Protocol, a major Solana-based DeFi exchange, has suffered a $285 million social engineering-driven exploit that weaponized a compromised administrator...

Sequoia Capital’s early investment in a trillion-dollar tech giant with ‘questionable’ management

Sequoia Capital’s early investment in a trillion-dollar tech giant with ‘questionable’ management

April 2, 2026
0

Venture capitalist Don Valentine invested $150,000 in Apple in 1978, two years before the startup went public

Blackstone pushes back on private credit GFC claims

Blackstone says today’s private credit is ‘nothing like 2008’

April 2, 2026
0

Blackstone has pushed back against “exaggerated claims and misleading comparisons” currently blighting the private credit sector, arguing that current market...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.