SHARE
Posted July 1, 2019
When it comes to understanding cybersecurity, can you separate fact from fiction? Because cybersecurity is a relatively new industry, there is a lot of noise surrounding it. This can lead to a number of misunderstandings or misconceptions about security that could actually open your organization up to new risks.
Here are some of the most common misconceptions we hear on a regular basis:
At GreyCastle Security, we often hear these two questions: “Aren’t security and compliance the same thing?” and “Won’t this compliance regulation make us more secure?”
Typically, this line of thinking is driven by an area of an organization that views certifications (such as ISO 27001) as a hurdle to progress. They see security as something that could get in the way of business growth and would rather apply the “Band-Aid” of compliance to ensure security moving forward. However, the true core of security is managing risk. Understanding cybersecurity means making that your primary goal. You know your organization has information that people want, whether it’s intellectual property, health information, or customer data. You need to approach your information security strategy from the perspective of, “What do I need to cover, and where do I focus my efforts?”
The difference between security and compliance can be complicated, but security focuses 100% on the risk that all of the information you hold poses to the organization. Some organizations choose to approach compliance from a check-the-box mentality. The best strategy is to ensure that the two are working together. When you earn a certification, ensure that it works functionally throughout the organization and that your business is able to adapt to it and build security into the overall culture.
There are, in fact, several key differences between vulnerability assessments and penetration testing. Both, however, are critical to maintaining a robust security posture.
A vulnerability assessment is a process for identifying weaknesses within an organization’s environment and locating them. Automated “scanning” tools can be used to search an organization’s infrastructure for technical vulnerabilities and manual tests can be used to verify results and evaluate network security. Vulnerability scanning tools cannot distinguish between exploitable flaws and those that cannot be exploited.
Penetration testing is designed to simulate a real-world cyberattack and uses the same techniques that a modern cybercriminal would use. It simulates as closely as possible the effect that these threats would have on your organization, and it is recommended that penetration testing be performed by a third party to avoid conflicts of interest and provide a more objective view of the business environment. Penetration testing is accomplished by understanding cybersecurity threats and targets as well as your attacker’s motivations and capabilities.
There is no “silver bullet” in cybersecurity. Understanding cybersecurity means viewing it as a business excellence issue. Technology is a conduit for a people problem within organizations. There are three parts to cybersecurity and compliance: people, process, and technology. While technology is a piece of cybersecurity and needs to be addressed, we must remember that we are not working for the technology – the technology is working for us.
100% of cybersecurity attacks have a human element to them, whether it is someone clicking a link in a phishing email, an executive assistant giving out credentials over the phone, an employee letting someone into the building, or misconfigured firewalls and endpoint security. It all comes down to the human element. Technology can be an integral part of your strategy, but it’s important not to get locked into a “technology only” mindset.
Additionally, when you expand beyond technology, you can begin to speak on how cybersecurity affects other areas of the business, such as policy development or vendor management, and be in a better position to secure executive buy-in. Remember: cybersecurity is not just an “IT” problem. It is a business problem and a business risk.
The distinction here is important. The word “breach” is a legal term. Once you declare there has been a breach, you have started a ticking clock in terms of reporting. Do not use the word “breach” until you have confirmed with your legal team that it is the correct term to use.
How you label an event will determine a variety of factors, including the departments that need to be involved, what actions you need to take, if you are required to notify anyone. If notification is required, you will also need to dertmine who to notify, when, and how.
Many organizations believe they are “too small” to be targeted by cyberattacks. In reality, hackers look for low-hanging fruit. They want the targets that require the least amount of time, effort, and money to exploit – and they know that many small businesses do not invest as heavily as they should in cybersecurity. The 2018 State of Cybersecurity in Small and Medium Size Businesses study conducted by the Ponemon Institute showed that small businesses now face the same information security risks as larger organizations. Despite this, almost half of the survey respondents reported that they had no understanding of how to protect their organizations against a cyberattack.
Malicious attackers will always exist, and they are interested in businesses of all sizes.
Are you moving the needle for the business? Are you actually making the organization more secure, and how can you quantify that for people that look only at numbers (e.g. CFO)? Over time, security has grown to be a bigger percentage of the budget inside of organizations. It is the cost of doing business today and it is typically a recurring cost. Despite the misconception, there are real ways you can communicate the value of security to your organization.
Keeping your organization secure is an ongoing effort that requires participation from everyone in the business. Educating stakeholders on best practices and correcting misconceptions is a good first step to understanding cybersecurity.
Offerings
Industries
Compliance
Copyright © 2023 GreyCastle Security. All Rights Reserved
Copyright © 2022 GreyCastle Security. All Rights Reserved
Ho Chin is Chief Financial Officer at GreyCastle Security. In this role, Ho leads Finance, HR, IT and Professional Development. As part of the executive leadership team, Ho works to establish the company’s overall strategy and ensure proper execution of the supporting initiatives pertaining to the above areas of responsibility.
Prior to joining GreyCastle Security, Ho led finance and administrative functions at multiple private equity and venture-backed portfolio companies across multiple industries. Ho holds a bachelor’s degree in Accounting from Pennsylvania State University in Centre County, Pennsylvania and a master’s degree in Business Administration from the Wharton School of Business at the University of Pennsylvania in Philadelphia, Pennsylvania.
Michael Stamas is an entrepreneur, board member, Vice President and a founder of GreyCastle Security. With more than two decades of experience in the technology sector, Mike pairs his management and business development skills with a deep understanding of cybersecurity. Mike brings a unique brand of risk-based advising to GreyCastle clients and prospects.
Mike holds certifications in numerous security and technology related areas, including the Department of Homeland Security and other security technologies like Symantec, Cisco and Microsoft.
Mike plays an active role in his community and serves as a board member and Vice President of InfraGard Albany as well as an advisory board position with the Capital Region YMCA.
Mike has been recognized for his numerous achievements through various honors including the Albany Business Review’s prestigious 40 Under 40 award.
Dan Kalil is Chief Executive Officer (CEO) and Board Chairman at GreyCastle Security. In this role, Dan provides vision, leadership and strategies that drive GreyCastle Security’s position as an industry leader. With an emphasis on customer success, Dan’s profitable growth model leverages a customer-centric business approach that balances employee wellbeing and social responsibility.
Prior to becoming CEO, Dan served as the company’s Chief Strategy Officer, during which he supported multiple acquisitions and helped the organization achieve substantial sales growth. In addition to serving as CEO at GreyCastle Security, Dan continues to hold the position of Chief Commercial Officer (CCO) at Assured information Security (AIS) in Rome, New York, a company he co-founded in 2001.
Over the course of the last 22 years, Dan has been committed to advancing the state of cybersecurity and has played an instrumental role in the identification and development of critical, next-generation cyber capabilities. He has held positions in almost every facet of cybersecurity, beginning as a computer forensic examiner and progressing through the management and executive leadership ranks. In addition to co-founding AIS, Dan has facilitated multiple cybersecurity startups, raised investment capital and has served in various lead and support roles toward the acquisition of five companies in the last eight years.
Dan has a bachelor’s degree in Cybersecurity and a master’s degree in Cybersecurity from Utica College in Utica, New York.
Dan Maynard serves as GreyCastle Security’s Chief Operating Officer, where he currently leads Sales, Marketing and Legal.
Dan has enjoyed a 30+ year career in the Information Technology and Telecommunications industry, during which time he has held various leadership positions for organizations such as Rochester Tel/RCI, Citizens Communications (Frontier), PAETEC Communications, IntegraOptics, tw telecom/Level3 and Centurylink.
In addition to various voice and data technology platforms, he possesses a strong background in leadership development, sales and marketing leadership, transformational leadership and strategic planning. Dan has a thirst for knowledge and as a committed lifelong learner, he encourages and supports professional development initiatives for his teams and continues his involvement with Vistage International.
Dan holds a bachelor’s degree in Biology from Lafayette College in Easton, Pennsylvania, where he was selected as a member of their Athletic Hall of Fame in 2016.
When not at work, Dan enjoys traveling, golfing, attending Utica Comets hockey games and relaxing in the Adirondacks on beautiful Canada Lake with family and friends.
Dan Didier is the Vice President of Solutions and board member at GreyCastle Security.
Dan has been a cybersecurity practitioner for more than 20 years and uses his knowledge and experience to develop cybersecurity solutions that ensure readiness and preparedness.
Dan received his bachelor’s degree in Telecommunications from SUNY Polytechnic Institute in Utica, New York, and graduated Summa Cum Laude with a master’s degree in Information Assurance from Norwich University in Northfield, Vermont.
Our Computer Incident Response Teams (CIRTs) have responded to hundreds of breaches, intrusions, malware infections, thefts, employee investigations, fraud cases and other incidents. Our highly-certified experts have extensive experience in command, coordination and correction of incidents in nearly every industry throughout North America, from local businesses to Fortune 500 international conglomerates.
Francesca LoPorto-Brandow is Director of Culture at GreyCastle Security. In this role, Francesca leads all social responsibility efforts and partnerships and develops effective strategies that promote organizational-wide behaviors and attitudes consistent with a culture of safety, inclusion, teamwork, motivation and high-performance.
Prior to this role, Francesca was Director of People & Culture at GreyCastle and with her leadership, the company’s culture has been recognized by Inc. Magazine as a Nationally recognized Best Workplace, Albany Business Review Best Places to Work and Albany Times Union Top Workplaces.
Before joining GreyCastle Security, Francesca worked as an OD consultant and focused on strategic culture change at The Kaleel Jamison Consulting Group, Inc. for more than six years. There, she facilitated client education sessions, coached leaders and teams, developed and executed consulting interventions and served as strategy project leader on various client engagements. Her work has taken her into Fortune 100 companies and across borders including Panama, Singapore and beyond.
Francesca is a Lean Six Sigma–certified Green Belt, a proud YWCA-GCR board member and in 2013, she coordinated and emceed the inaugural TEDx Troy—a livestream of TEDCity 2.0. Since 2012, she has coordinated and emceed the Troy 100 Forum, a biannual forum for government, religious and community leaders to discuss issues vital to the future of Troy, New York.
Bilingual in English and Italian, Francesca holds a bachelor’s degree in Management and Technology from the Rensselaer Polytechnic Institute’s Lally School of Management & Technology. She was awarded Cybersecurity Recruiter of the year North America in 2017 by the Cybersecurity Excellence Awards.
Jamie Aiello is Senior Vice President of Services and Product Management at GreyCastle Security. In this position, Jamie is responsible for leading a high performing and well-balanced team that is ultimately responsible for the identification, selection, execution and successful performance of our company’s diverse portfolio of cybersecurity offerings.
Prior to joining GreyCastle Security, Jamie has held leadership positions with Annese and Associates, ConvergeOne and BlueSky IT Partners with a focus on delivering cost effective information technology solutions for companies across multiple verticals.
Jamie holds a bachelor’s degree in Political Science from Le Moyne College in Syracuse, New York, a master’s degree in Business Administration from Gardner-Webb University in Boiling Springs, North Carolina and a master’s degree in Computer Information Systems from University of Phoenix in Phoenix, Arizona.