<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=522217871302542&amp;ev=PageView&amp;noscript=1">

Defining a Security Posture

Posted by Donald Lupejkis on Dec 15, 2017 12:00:00 PM

Imagine you’re going camping this weekend. You’ll be meeting your friends and family there, and it’s going to be a festive time.  (C’mon, play along here.) Time is short, so your brain has probably already started thinking about what you need to pack and purchase to make sure a good time is had by all.   

This isn’t your first rodeo. You’ve gone camping so many times you can’t even count them all. You have measures in case of every meteorological event happening. You have contingency plans for contingency plans. This camping trip will be epic no matter what happens.

Sleeping bags and tent? Check. Food and drinks? Covered. Survival knife, firewood and fire starting materials? Got it. If it rains, boots and rain gear – packed. Bears? You know to hang your food on a rope suspended between two trees to keep them away. There are many more things you need to bring, so you make a list.

You have a plan.

It’s the same process and mindset when it comes to Cybersecurity. You need a plan in place to protect your organization against different methods of cybercrime. This plan is called your security posture.

This plan is your formal strategy on how to defend your organization against various types of cybercrime. It needs to have information about the safeguards you have in place in the following security domains: security intelligence, perimeter and network security, identity and access, application and data security, endpoint and mobile security, and advanced fraud and web security. It will also list plans you have in place for different security events. For example, your disaster recovery plan, your incident response plan, or what you have documented in your official Security Policy.

Without a plan, how can your customers reasonably protect themselves? Per our example above, if you’re not a camping expert, where do you even start in regards to packing for this adventure? It’d be smart to consult a pro who has the appropriate expertise. They’re familiar with the location/camping area, aware of the different what-if scenarios while camping there and know what equipment you should pack.

You may have heard that you need a “good” or “strong” security posture. That means an organization should have reasonable protections against a variant of cyberattacks most common to that organization. Solutions should be in place to protect against attacks that are most pertinent to their business and what makes the most sense. You should provide defenses where you’re most likely to experience an attack.

With all the different cyberattack methods and all the different technologies and solutions, where does one even start?

You’re in luck if you’re a Tech Data customer, as you have access to the camping Security experts. It’s recommended for an organization to start with a Security Profile Assessment. Whether your customers are in a specific vertical or just fall into a “general” category, Tech Data has complimentary assessments that not only list what controls and measures are in place, but also rate the organization’s security posture versus other similar organizations’ controls and measures. 

One of your customers needs a complimentary Security Profile Assessment; you know which one.  Contact donald.lupejkis@techdata.com or christine.mcgettigan@techdata.com to schedule an assessment today!

Tags: Security, Cybersecurity, Security Assessment