Is Your Security Military-Grade?

Simple civilian security won't cut it for most businesses. It's time to take your cybersecurity mil-spec.

Most companies and individuals in the developed world have very little knowledge of advanced military tactics. We don't need that knowledge in our daily lives. The rise in state-sponsored cyber crime is changing the calculus when it comes to knowing advanced hacking techniques. And most of us have a lot to learn.

Think about it: Do you know what the four F's are in small-unit tactics? If someone asked you to quickly set up a Fire Trap, could you do it? Unless you've recently served in the military or are prepared for civilian action on at a very high level, the answer is probably "no." The good news is that most of us can live happy, safe lives while remaining ignorant of those and many other tactical topics.

Even if your job involves physical security for a business the liklihood is great that you'll never be required to know vertical envelopment or the applications of motti. The differences in civilian and military needs and tactics are just too great.

In the world of cyber defense, though, there is only a small difference in the tactics used by criminal hacking groups and those used by nation-state hackers bent on economic disruption. We've seen this sort of tactical similarity in recent ransomware attacks that focused their damage in Europe and in very targeted attacks on civil infrastructure in Ukraine.

So what do you need to know if you're going to avoid becoming a casualty of this latest war? First up is figuring out how to keep up with new information. US-CERT should be on your daily update list. In addition, there are several mailing lists and bloggers that should be hitting your in-box at least once a day. Author's Note: Which security writers and lists do you look to for info? I'd love to know your favorites -- please let me know in the comments! Next, you must understand what the warnings mean.

When a researcher puts out information on a new vulnerability, dig into it and follow the code. Look at the services and apps that the vulnerability hits and immediately start the process of understanding whether your enterprise applications depend on the affected services. Talk to your best security people and get them to explain exactly what's happening. You'll probably find that most of your security folks are eager to share their knowledge with someone who comes asking genuine questions to which they really want to know the answer.

Finally, convince your executives that you're not too small, too insignificant, or too obscure to be a target. One of the things that we've seen is that many attacks use shotguns as an analogy -- their pellets of destruction spread all over the landscape. Being prepared means keeping up with backup and recovery routines, having an up-to-date business continuity plan and yes, practicing both to make sure you know that they work.

Security isn't easy and it may not be cheap. But in the second decade of the current millenium it's far cheaper than repairing the damage that can come from a military-grade exploit launched against your company.

What's your plan? Are you worried about the escalating danger? Or has your business gone back to abacus and quill pen to escape the cyber danger? Let us know -- it's a story that involves all of us.

Related posts:

— Curtis Franklin is the editor of Follow him on Twitter @kg4gwa.

Read more about:

Security Now

About the Author(s)

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights