Walls: Not the Be-All and End-All of Cybersecurity


Walls. For years, humans have relied on walls as the first line from defense from nature and foreign threats. However, these trusted walls aren’t always sufficient to protect people from extreme natural disasters or explosive weapons. According to a recent survey of 1,100 information technology decision makers by international digital security company Gemalto, the same goes for digital defenses.

Sixty-one percent of respondents said that their perimeter security systems—including firewalls, content filtering, anomaly detection, etc.—were “very effective” at keeping out unauthorized users, Gemalto said. However, 69 percent said that they aren’t confident that their organization’s data would be secure in case of a data breach. 

Data breaches aren’t fictional threats—they are very real and happen quite frequently. There were more than 780 data breaches reported by organizations in 2015, and the number has been steadily rising. According to Gemalto, the increasing number of data breaches in the recent years has affected how companies deal with data breaches. Seventy-eight percent of respondents said that they had adjusted their strategies as a result of high-profile data breaches and 86 percent said they increased their spending on perimeter security. 

Despite building these digital walls, companies continue to face data breach threats, the survey found. “The days of breach prevention are over, yet many IT organizations continue to rely on perimeter security as the foundation of their security strategies,” it said. 

The report suggested IT professionals to shift their mindset “from breach prevention to breach acceptance and focus more on security the breach by protecting the data itself and the users accessing the data.”

The Gemalto survey concluded that “perimeter security is a focus, but not a panacea for data breaches.” 

To keep up with the constantly evolving world of privacy and security sign up for the Bloomberg BNA Privacy and Security Update.