It's no longer really a question of 'if' but 'when. Maybe not all companies will get breached, but many will, especially those that are specifically targeted by attackers. That's not about waving the white flag (more on that in a bit). And neither is it always an indictment of a company's security posture. Some organizations are careless. But many others are just unlucky. It's hard for instance, to imagine that organizations such as Sony, RSA, Oak Ridge National Laboratory, and Google got breached because they weren't paying attention to security.
The simple fact is that there's just far too many ways that a company can get compromised these days and it's unrealistic to assume that they can defend against every single attack, every single time. Unless an enterprise simply disconnects from the Internet, sooner or later, the bad guys always will get lucky. If someone really wants to, they will find a way in.
Enterprises (at least many of them) are spending more on security these days than before, but they are also more at risk. Any company with an Internet presence presents a large attack surface for those who want to target them. Operating systems, Internet browsers, application software and database tools continue to be as buggy as ever. The security products that companies use to protect themselves aren't always secure.
Then there's the whole consumerization of IT thing going on. And of course, there's always the errant end user who's going to click on a phishing email, or share music over a file-sharing network using their corporate PC, or post a corporate document on their Facebook page. And let's not forget the increasingly well-funded, increasing well-organized and increasingly well-armed cyber crooks that are constantly devising clever new ways of breaking in and stealing stuff.
None of this is about being defeatist or throwing in the towel and letting the bad guys walk all over. Rather its more about acknowledging that breaches can and will happen. It's more about damage containment and being ready for what happens when an intruder does break in. An intrusion means little, if the intruder has no place to go, nothing to steal and nowhere to hide.
Enterprises obviously need to continue doing everything they are doing and more. Perimeter and network protection technologies such as firewalls and anti-malware tools and IDS and IPS are still going to be vital for protecting against a vast majority of the threats out there.
Sign up for Computerworld eNewsletters.
Essential Guide to Cybersecurity in Singapore
Download the most popular cybersecurity articles from CIO Asia to help you on your cybersecurity journey.
Why Cloud-based Solutions like SaaS Makes Sense
Discover why more and more organisations are choosing SaaS solutions.
Enterprise Cloud Adoption: Key Trends and Considerations
Learn how enterprises will leverage cloud and digital transformation over the next 12 months, along with best practices to accelerate cloud adoption and growth.