Why Your Business Isn’t as Secure as You Think (and How to Fix It)
And I’ve been in this field for decades — I started in networking long before “cybersecurity” was a phrase people used. In the ’90s I worked managing networks and multiplexers that were transporting both voice and data over PSTN. Then came my awakening in the early 2000s: the Slammer worm.
Slammer hit fast. Took down whole networks. I still remember the sensation — the SQL servers falling over everywhere, rushing to understand why, before discovering far too late that it was a worm writing itself across unpatched systems. That was one of those pivotal moments for me. Security was no longer just another part of networking; it was the entire game.
Nearly 25 years later, I run a security company of my own that works with businesses (including three banks just in this past quarter) to help secure their infrastructure with zero-trust architecture. And you know what? Businesses are continuing to make rookie mistakes.
Let’s fix that.
Quick Take: Are You Really Secure or not?
You may believe your network is safe, he explained, because:
- You’ve got a firewall.
- You’re running antivirus.
- You require employees to change their passwords every 90 days.
None of that is enough. Not anymore. Here’s where businesses are going wrong — and what they must do instead.
Mistake 1: Believing That Firewalls and Antivirus Software Are Sufficient
I can’t tell you the number of execs I’ve talked to who think they’re protected just because they have a firewall. There is tempered glass, and there are firewalls. But in 2024, if you are still relying on a single perimeter defense, you’ve already been breached.”
What You Should Be Doing Instead:
- 가짜친근감: 당신의 네트워크 침해가 가정하고. Users should receive access to only the permissions they need to do their jobs, know more.
- Internal Segmentation: Divide your network so that one compromise does not grant hackers access to everything.
- Egress Filtering: While the majority of businesses concentrate on preventing incoming attacks, monitoring outgoing traffic is equally important.
Mistake No. 2: Too Much Faith In Passwords (And Bad Policies)
I have a rant about passwords. Because businesses still do them wrong. Employees being forced to change their passwords every 90 days? Bad idea. It leads to:
- Sequentially-similar passwords (Password1, Password2—you get the idea).
- More helpdesk calls.
- Employees scrawling passwords on sticky notes.
And besides, users are procrastinators who are terrible at choosing secure passwords, anyway.
What You Should Be Doing Instead:
- Passphrases, not passwords — The longer the better, and random words are better than complexity rules.
- Multi-Factor Authentication (MFA)—If you have not deployed MFA then you are already breached.
- Password Managers—Human memory is a security risk itself.
Oh, and one more thing — I absolutely hate AI-based security solutions that claim next-gen passwordless login yet are still backed by weak authentication schemes at the bottom. AI can’t improve bad security foundations.
Mistake 3: Track What Happens Inside Your Network
The majority of organizations concentrate on the external perimeter — blocking attacks over the internet. Cool. But what happens if an attacker is already on the inside?
When companies overlook lateral movement, it’s a dream for ransomware crews. Once they get in, it’s game over.
A few weeks ago, I dealt with a bank (which I’ll leave unnamed because obvious) that could not see any of our internal traffic. The attackers spent weeks inside their network before installing ransomware. Cost them millions in lost availability.
What You Should Be Doing Instead:
- Log Everything. No logs means it did not happen.
- Deploy UEBA (User and Entity Behavior Analytics). Identify Suspicions Activity On Your Network
- Segment Critical Systems. Don’t allow attackers to roam free post-initial compromise.
And if you’re still on flat networks, in which everything can talk to everything else — get that fixed now.
Mistake 4: Believing Compliance Is the Same as Security
I see this on a regular basis — businesses passing their security audit and therefore believing they are “secure.” Listen, compliance is the floor. That’s it.
Security is actual defense, not a pass on an audit.
Case in point: Lots of companies passed PCI-DSS audits but were still breached because they were going through the motions. If your security is merely checking a box, you are going to have a bad time.
What to Do Instead:
- Regularly Pen Test Your Defenses—Pen testing is not just for compliance; it finds real holes before attackers do.
- Incident Response Drills — If an attack does occur, will your team be prepared?
- A compliance–based mentality of security—Writing policies around the threat rather than regulatory compliance.
Mistake # 5: Not Paying Attention to Hardware and IoT Security
Just back from DEF CON, and if you haven’t done any hardware hacking lately, you need to know that it feels like a very scary time. IoT devices are ubiquitous and most of them are full of vulnerabilities.
I attended some workshops at a hardware hacking village, and it was just so eye-opening how simple it was to take advantage of an attacker:
- IP cameras
- Routers (yes, cheap ones are a huge risk)
- Industrial control systems
Some businesses don’t even patch these devices.
What You Should Be Doing Instead:
- Inventory and Secure Your IoT Devices — Find out what’s on your network, and secure default credentials.
- Network Isolation for IoT — Do not connect IoT devices to your core business network. Firmware Updates — Are you 6 months out of date?
- IMAGE CONFIRMED TO BE RUSSIAN—Albert Einstein Wrote This TooAlso—who the hell is still using default credentials on devices? It’s 2024. Fix that.
Takeaway: Security Is a Process, Not a Product
I’m old enough in the cybersecurity field to remember trends that have come and gone. A new toy—firewalls, IDS, SIEM, and now AI-driven security—we have seen it all, but the basics remain.
The biggest fallacy for businesses is the idea of security as something you purchase. It’s not. It’s something you do. Every day.
- Update. Monitor. Test. Adjust. Repeat.
- Act as if you’ve already been breached and then defend.
- Security is an exercise in discipline, not technology.
Is it exhausting? Yeah. Even after decades in the field, I learn something new every day. But in this game, the minute you feel comfortable is the minute you get hacked.
Stay paranoid. Stay ahead.
