devxlogo

People, Processes, Technology: Exploring the 3 Pillars of Cybersecurity

Cybersecurity processes are more important than ever in a world comprising interwoven economies, entangled geopolitical interests, and nascent multinational conflicts. As political and social barriers to large-scale cybercrime fade in the face of crumbling international norms and relations, attacks that cast a wide net and impact not only major players but also small businesses and individuals are becoming more likely.

The risks multinational businesses face are particularly concerning, given their greater exposure and potential relevance to global turmoil. But businesses of all sizes should be prepared to deal with the increased threat of broad cyber attacks that may affect them or the systems they rely on. Whether you’re pursuing an online Masters in Cyber Security in the hopes of working for a large corporation or starting up your own small business, understanding the basics of cybersecurity is no longer an option. It begins with understanding the three pillars of IT management: people, processes, and technology.

1. People

The most common mistake made in cybersecurity processes, by both IT professionals and others, is focusing too much on technology and not enough on people. While the media has conditioned us to associate hacking with images of antisocial computer gurus hunching over a computer screen in dark, isolated rooms, the reality is far removed from this stereotype.

In the real world, as much as 90% of all cybersecurity breaches involve social engineering. Whether it be a phishing email targeted at a less tech-savvy employee whose careless click results in inadvertent software installation that introduces vulnerabilities into a critical system, or a hacker approaching a socially vulnerable employee at a bar and using an RFID cloning tool to duplicate a security key, the truth is that people are the most vulnerable elements of any system.

The best and only way to ameliorate the risks caused by people is to teach them. Training on basic cybersecurity topics like awareness of phishing emails, using trustworthy software, keeping business data confidential, and best practices for data storage and password maintenance can make all the difference. While some people in your business may find these trainings repetitive or unnecessary, most people will, at the very least, benefit from regular reminders about cybersecurity processes and vulnerabilities; some may be completely unaware of the risks they confront every day, and they are a hazard to a business if left untrained. Some employees may be exposed to more attack surfaces than others, and, as a result, may need additional role-based training and information that goes beyond basic security best practices.

The next step is ensuring that all employees follow the necessary procedures to use company resources appropriately, but first, you need to have those processes!

2. Processes

Establishing and enforcing clear, consistent processes is crucial for ensuring consistency in deploying and utilizing business-critical systems. They provide the structure and guidance needed to implement and maintain digital practices conducive to a secure operating environment. Creating policies, procedures, and workflows that accomplish business goals without compromising security is a must for any business of any size, and is especially crucial as businesses grow and quality management becomes more difficult.

The first step to building processes that effectively address cybersecurity concerns is to build effective processes that achieve the desired outputs. While having consistent, secure processes and procedures provides an element of predictability that aids cybersecurity in and of itself, processes must also reflect the needs of the business. If processes don’t cover all steps necessary to produce the desired output, they risk encouraging deviation from the process, which could compromise the security of the intended workflow.

Risk assessment is the process of understanding the risks inherent in business processes. Building processes that address the business’s security needs requires identification of the risks imposed by any business process. Identifying and evaluating potential threat vectors inherent in any process is crucial to building processes that address the resulting risks.

Risks and Threats

When designing a new procedure, it’s important to account for every system involved in the process, and to account for both the risks introduced by those systems and any potential emergent threat vectors that arise from using those systems in tandem. For example, using the internet is generally safe, so long as one knows how to avoid risky links and potentially dangerous websites. Using a bank is also safe. But combining the two by using internet banking services introduces a wide variety of new threat vectors that aren’t inherent to either system in isolation, and these threats will require the implementation of processes, like two-factor authentication, that aren’t required for either system independent of the other.

We always hope to avoid worst-case scenarios – that’s what building processes are all about. Unfortunately, things inevitably go wrong in business, especially when technology is involved. That’s why planning for incidents and problems is crucial to business cybersecurity processes. Risk management is the process of foreseeing risks and planning to minimize their impact on the business. This involves creating processes for mitigating the damages incurred by problems faced and processes for responding to these situations.

A great example is data backup and recovery. Having a backup system in place is vital to ensure that if, for example, a computer owned by the business is infected with ransomware, the data on that computer can still be retrieved without acquiescing to the demands of the thief. A process needs to be established to ensure backups take place regularly and to address the possible scenario of needing to restore data to a working machine.

Ultimately, the types of cybersecurity processes your business will need will largely depend on the technology it relies upon.

3. Technology

Last but certainly not least, deploying the appropriate technologies is vital to ensuring the security of business assets against bad actors. Computer systems have three components that need to be secured to ensure their integrity: the computer hardware, software, and network.

Hardware is the physical components that make up the computer. Securing computer hardware involves using up-to-date computers that run current software, physically securing business computers using passwords and physical locks, and ensuring that these components function as needed. This includes not only the computer itself but any peripheral devices that might be used with it, including external hard drives, flash drives, hardware security keys, and even basic components like keyboards, mice, and displays.

It’s vital to use current, high-quality computing hardware for business-critical cybersecurity processes to ensure the business’s hardware doesn’t introduce unnecessary vulnerabilities. This means only using computer equipment purchased from trusted retailers, and eliminating the use of business computers with any personal devices or for any personal needs. In the case of businesses with more complex needs, additional security-related hardware, like computers that utilize physical locks or ruggedized form factors, may be required.

Software Security

Software security, like hardware security, mostly involves using trusted, up-to-date software.  Keeping the operating systems and all software used on business computers properly updated is crucial to ensuring both the integrity of business processes and data, as well as maintaining the security of business computers. It’s also important to use trusted antivirus software. While most Windows computers come equipped with Windows Defender, some businesses will benefit from additional antivirus software, depending on their needs and level of exposure. Businesses may also choose to use encryption on business computers to ensure the security of their data if a thief or other unauthorized party gains access to a business computer.

Networks are the systems that connect computers. Whether it be the Ethernet cable that connects your computer to a local network to use a printer, or your office’s connection to the whole World Wide Web, all network access points and everything that connects them need to be secure. Using an up-to-date modem and router is important to ensuring network security, and utilizing a firewall to control traffic on your office network is also a smart choice. If your business uses or transmits sensitive data, it may be appropriate to look into more intensive network security measures, like network switches that employ MACSec or layered EDR systems, to ensure ultimate security.

Photo by Adi Goldstein; Unsplash

Rashan is a seasoned technology journalist and visionary leader serving as the Editor-in-Chief of DevX.com, a leading online publication focused on software development, programming languages, and emerging technologies. With his deep expertise in the tech industry and her passion for empowering developers, Rashan has transformed DevX.com into a vibrant hub of knowledge and innovation. Reach out to Rashan at [email protected]

About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.