CSO - Computers and mobile devices store, process and transfer highly valuable information. As a result, your organization most likely invests a great deal in protecting them. Protect the end point and you protect the information. Humans also store, process and transfer information -- people are in many ways are nothing more than another operating system, the Human OS.
Yet if you compare how much organizations invest in securing their computers versus how much effort they put into teaching employees how to safeguard information, you would be stunned at the difference. For example, organizations typically invest in the following resources to protect an end device:
Virtual private networks
Host-based prevention systems
Now go down that list and add up the cost for securing each computer. Then add support contracts, help desk phone calls, and how many full-time employees it takes to maintain all of this technology. You probably end up spending $100 or $200 a device.
Now, let's go through the exact same process for people. How much to secure each employee? Hear those crickets chirping? Your organization is most likely spending 20 to 50 times more on securing computers than on securing the Human OS, if it's working with those employees at all.
If finding the dollar amount for each computer is too complex, try a simpler metric. Count how many people you have on your information security team. Now, out of all those people, how many focus on securing technology and how many on securing the Human OS? You probably will end up with a very similar metric, something like 20-1 or 50-1. And organizations still wonder why the human is the weakest link.
Technology is important, and we must continue to invest in and protect it. However, eventually you hit a point of diminishing returns. We have to invest in securing the Human OS as well, or bad guys will continue to bypass all of our controls by simply compromising the human end-point.
Think of it in these terms: Fifteen years ago was the wild, wild West of hacking, the golden age of worms. Cyberattackers could easily compromise millions of systems by randomly scanning every system on the Internet and break into anything that was vulnerable, which was most systems in those days. We in the security community felt a great deal of pain and invested heavily in securing computers. Nowadays, computers come out of the box with firewalls, minimized services, automated patching and memory randomization. Fifteen years later, it has become much harder to compromise a computer.
But in those same fifteen years, what have we done for the Human OS? Nothing. As a result, the Human OS is still stuck in the days of Windows95, WinNT or Solaris 2.5. There is no firewall on by default, all the services are enabled, and this operating system is happy to share data with anyone that asks.
Until we begin to address the human problem, the bad guys will continue to have it easy.
Lance Spitzner is the training director for the SANS Institutes Securing the Human program.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!