Why do we care about cyber hygiene? For starters, security pros want to ensure operating effectiveness of basic controls and put in a system of checks and balances between processes. Companies also want to offer a foundation for more advanced technical security mechanisms, their effectiveness becomes limited otherwise. They also want to detect blind spots in security management and monitoring, ensuring their scope covers all necessary factors.
But hackers usually follow the path of least resistance. While the 2019 Verizon Data Breach Investigations report found that 52 percent of breaches featured hacking and 33 percent were social attacks, 21 percent were errors caused by casual events and 15 percent were misuse by authorized users.
In his presentation at InfoSec World 2020, "How to Implement the ‘Triangle’ of Network Security Management," Ryan Rodrigue, principal at Wolf and Company, laid out the three aspects of the triangle - asset, patch and vulnerability management.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.