Security

Cybersecurity Defenders, Deputies & Trace3

JUL 31, 2017

As organizations embrace digital transformation they face an entirely new set of challenges related to securing vital systems and information. Cyber attacks are on the rise and what businesses are experiencing can be compared to the days of the wild west. Policing booming cities was often in the hands of a sheriff and a handful of deputies. They were unable to mitigate most crime or even take a proactive stance against the bad guys because of the sheer number of citizens and incidences. Instead, risk was evaluated and only the most critical situations were addressed. What happened when the bandit gang rode into town with the intentions of robbing the bank? Who did the Sherriff call to aid the town when the deputized forces were totally outmatched? The comparison to what cyber defenders of today are dealing with is striking. Well folks, there is a new sheriff in town; Trace 3 Security.

Why We Do What We Do

Trace3 is the modern-day answer to the lawlessness of cybercrime. Organizations are looking for better ways to operationalize security strategy but most don’t know where to start. Trace3 possesses a strong foundation built upon strategic networking, storage, and cloud computing, which provides unique capabilities as an end to end information security provider. Industries and organizations are dealing with problems they never had to solve before. Many legacy partners are struggling to solve these new challenges confronting businesses and in some cases are not able to address the challenges.  For this reason, we strive to seamlessly integrate disruptive technology into every aspect of our customer’s business, so that security becomes an enabler instead of an inhibitor. Why Trace3 Security? Because everyone else can make security more complex, but it takes innovative security to keep things simple.

Obstacles and Challenges Enterprises Must Consider When Addressing Cybersecurity (The How)

Now that you know you are not alone in the wild west of technology, what kinds of challenges or obstacles do most enterprises contend with regarding Cybersecurity?

  1. Less People To Do More Work

The skills gap is widening at an alarming rate. Experts aren’t sure if security just isn’t sexy to the masses or if potential candidates are frightened away by the inherently complex landscape of cybersecurity. Education needs to do more in order to attract talent to cybersecurity programs.

Consider: user and entity behavior analytics, automated threat hunting, and managed security service providers.

  1. The Password

Passwords and password breaches continue to plague organizations. Users tend to go with passwords that are easy to remember. The main problem isn’t always password complexity, it is that people use the same password in multiple locations. Your organization may have the best security intentions and do a great job of keeping bad actors out, but if your user’s password was compromised on a site you don’t control and then that password is used to gain what appears to be legitimate access to your network, what then?

Consider: multi-factor authentication. Something you have, something you know, and something you are.

  1. Bring Your Own Device (BYOD)

Bring your own device, while initially great for saving organizations money, has brought with it security concerns. The main problem has been keeping organizational data separate from personal data. Compromised devices have also granted attackers back door entry into systems.

Consider: mobile device management complete with secure content locker and data loss prevention.

  1. Insider Threat

Perimeter defense, until recently, has been the primary focus for security budgets. The idea is to keep the bad actor out. The problem is, some bad actors are already inside. User and Entity Behavior is critical to creating a baseline of how your people and devices are potentially abusing provisioned access.

Consider: user and entity behavior analytics, data and access governance, and identity management.

  1. Social Engineering

Imagine the CEO of your company asks you for W2 information through an email and you provide it but then realize that the email wasn’t from your CEO. This is a real-world example of something that happened. Many organizations have adopted simple technology that flags if an email is internal or external because of this very example. More needs to be done to combat social engineering and protect users from themselves.

Consider: secure mail gateways, user security education, and endpoint protection.

What We Do

Trace3 Security is uniquely positioned to help organizations solve cybersecurity challenges. The way we do this is through our E3 Methodology: Envision, Engage, and Evolve.

ENVISION – IT success through assessment and consultation.

ENGAGE – Your organization through design and integration services.

EVOLVE – Your infrastructure through our continuous support and innovation.

Brad Bussie
Brad Bussie

Brad Bussie is an award winning fifteen year veteran of the information security industry. He holds an undergraduate degree in information systems security and an MBA in technology management. Brad possesses premier certifications from multiple vendors, including the CISSP from ISC2. He has a deep background architecting solutions for identity management, governance, recovery, migration, audit, and compliance. Brad has spoken at industry events around the globe and has helped commercial, federal, intelligence, and DoD customers solve complex security issues.

Leave a Reply

Your email address will not be published. Required fields are marked *