Four tough realities about keeping technology secure

We live in an imperfect world. It’s a place where cybercriminals target unsuspecting businesses to steal data, disrupt services and even extort money. A place where your technology is always under attack and risk is ever-present.

Why, then, would anyone expect cyber security to be perfect – particularly when so many of our main tools like firewalls and antivirus software have essentially been unchanged for decades on end?

If your security is based on the ambitious dream of precise, infallible detection, it’s just not made for the real world we all live in. That’s why Bromium’s game-changing solution takes a new, more pragmatic approach to keeping your estate secure.

The real challenges of cybersecurity

At a baseline, cyber security sounds simple. You buy the hardware, software or service you need to stop attackers from getting into your estate. You detect the signs of an attack in progress and put a stop to it, fast.

But this just doesn’t match the world we really live in. The truth is far more complicated.

1. You need to accept the risk
Most approaches to malware promise to remove your risk entirely. But just as crossing the road always comes with the risk of being hit by a bus, the way your business uses IT means risk is ever-present.

As a CIO, it’s your job to introduce the connections, technologies, and platforms your people need – and those will always add new risk. Eliminating risk altogether is impossible. It’s about how you control and reduce it.

2. Detection is ineffective
Detection systems like your firewall, antivirus, or anti-malware software are all great and removing the clutter of known, easy to mitigate attacks. But their dependence on signature libraries leaves them unable to help with all the new strategies that attackers create.

We’ve all used detection for decades on end. Your attackers have noticed. As a result, you’re increasingly likely to be targeted by a new, bespoke type of attack – one that your firewall and antivirus won’t catch.

3. Your users are their own worst enemies
It’s a hard pill to swallow, but the vast majority of your users don’t care about your cyber security. They care about getting the job done so they can win that new account, get that promotion, or just get to the end of the day.

They’re not people you should depend on to act as the frontline of your security strategy. Changing user behaviour is incredibly difficult and often falls apart the moment they’re in a hurry or under pressure.

4. Most people never improve their security
Finally, for all the talk about how fast cyber security and technology move, few organisations ever improve their posture and learn from the attacks they face. It’s hard enough to keep up with day-to-day security and there’s just no time to gather real intelligence.

Meanwhile, detection actively gets in the way of learning and evolving your security. When malware isn’t executed, you can only know so much about how it works, where it comes from, and how you can mitigate it in the future.

Security built for the real world

Where most security is built on idealism, Bromium takes a refreshingly ruthless approach to malware: allow it to execute securely and safely, then destroy it.

With Bromium, every user activity – from browser tabs to emails – is launched in a secure micro-virtualised container. Discrete and lightweight, it’s a place that’s 100% isolated from the rest of the workstation and, in turn, the rest of your estate.

As a result, users can click with confidence. Run what they like. And when they’re done, the entire container is disposed of – along with whatever malicious software may be lurking within it.

Written by