Cybersecurity

Thought provoking posts on Cybersecurity by Leadership Circle, brought to you by Spearhead Management and Dr. ir Johannes Drooghaag

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety.

The largest threat in Cyber Security are those who create a false sense of safety.

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety. There are a lot of false narrative related to cybersecurity, and unless you are having the required digital skills to evaluate them all, it can be quite challenging […]

The largest threat in Cyber Security are those who create a false sense of safety. Read More »

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk. Almost everyone who has been or is in a role with responsibility for IT has been in a situation where devices or operating systems had reached their end-of-life, but there were logical explanations why it would make sense to keep using them. Other priorities, budget restrictions,

Using systems beyond End-of-Life is a significant cyber risk. Read More »

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Our study The Human Element in Cybersecurity shows that abandoned technology is by far the largest root cause of cybersecurity incidents. And a significant part of abandoned technology is unpatched vulnerabilities. Vulnerabilities in applications, firmware, operating systems, drivers,

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Read More »

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill!

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill.

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill! For many years the focus of cybersecurity initiatives has mainly been on technology, which is of course important but does not cover the entire bandwidth of challenges and

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. Read More »

Prevention costs significantly less than cyber incidents.

Prevention costs significantly less than cyber incidents.

Prevention costs significantly less than cyber incidents. IBM recently published their annual Cost of a Data Breach Report, which gives valuable insights in the developments of cyber incidents and the various costs of data breaches. One thing is very clear when we review this report – the technical impact of a cyber incident is just

Prevention costs significantly less than cyber incidents. Read More »

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort.

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort.

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort. Data Loss Prevention is, as most of us hopefully know, much more than just making backups from important data, but is all starts with backups, of course. These backups should however also include

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort. Read More »

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures.

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures.

Three basic elements of cybersecurity, which are also known as the foundation or cornerstones of cybersecurity, are by far the most effective and simple measures to protect organizations and infrastructure against cyber threats. Without these basic elements, the implementation of more advanced concepts like ZERO trust are not possible, and in fact, don’t make any

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures. Read More »

When your organization does not see Cyber Security as a priority and business enabler, it will soon have to deal with a cyber breach. It is that simple…

When your organization does not see Cyber Security as a priority and business enabler, it will soon have to deal with a cyber breach.

When your organization does not see Cyber Security as a priority and business enabler, it will soon have to deal with a cyber breach. It is that simple… We are stilling seeing Cybersecurity being treated as a cost, a very expensive necessity. And even the necessity is more often challenged than accepted. Conversations about the

When your organization does not see Cyber Security as a priority and business enabler, it will soon have to deal with a cyber breach. Read More »