SHOULD YOUR BUSINESS FOLLOW GOOGLE'S SECURITY LEAD?

Google has introduced a new security strategy – but is it right for your business?

It has put some employees on a cyber diet, restricting their internet access to limit potential threats.

On the surface, it sounds like a smart move. Google's approach is like building a taller fence around your house to keep out burglars.

By reducing internet connectivity, they are effectively shrinking their digital footprint and making it harder for cyber criminals to find a way in.

But is it foolproof?

Well, not exactly.

While this strategy does limit external threats, it does not entirely eliminate the risk.

Think of it this way: you have built a towering wall around your house, but your teenager leaves the back gate open. Similarly, internal systems might remain connected to other devices that can access the internet, providing a potential entry point for cyber threats.

In other words, you cannot just focus on keeping things out.

Yes, there are very real threats from external hackers using all sorts of techniques like phishing, zero-day attacks, and malware. But the security industry often overlooks significant threats from within the perimeter.

Research shows that insider threats account for 62% of all security breaches. These insiders – disgruntled employees, careless staff, or malicious actors – often have legitimate access rights, intimate knowledge of the system, and can bypass traditional security checks. It is like having a burglar who knows where you hide your spare key.

So, what is the takeaway?

While Google's strategy has its merits, it is not a one-size-fits-all solution. Just as you would not wear shoes that are too big, your business needs a cyber security strategy tailored to fit its unique requirements. A robust cyber security strategy should focus on both external and internal threats and have measures in place to mitigate risks from all angles.

Our advice? Instead of simply following in Google's footsteps, consider your own business' needs and vulnerabilities. And of course, if you need help with that, River Run is here to help.


Topics

 

Share this article