With so much at stake, settling for less than best can have dire circumstances.rn History tells us that there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor. In fact, many of the products that we buy are much cheaper than the original models, because competitors cut corners to make something that is good enough to fit our needs at a cheaper price. As a director of operations, I can fully appreciate a lower priced option that still fits the needs of my organization. But good enough, could spell trouble, especially as this mindset creeps into the cyber security industry. If fact, I’d go so far as to say the single greatest cyber threat to organizations today is the “good enough” standard that’s being sold by key players within the cyber security industry. For example, many vulnerability scanning tools have been developed over the years and have become a crucial part of organization’s every day security posture. These scanning tools provide valuable insight into out-of-date patches and vulnerabilities that have been publicly reported. The problem: most organization’s vulnerabilities are not publicly known. We’re talking about nearly 90%! What does that mean? A vulnerability scan, or a scan based penetration testwill not identify those unknown vulnerabilities. That’s a high price to pay for good enough. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Still, this good enough mentality is easy to justify from a business plan standpoint. For the buyer, a scan-based penetration test or vulnerability scan takes less time and is more cost effective. For the service provider, it’s very hard to get and retain employees who have the skillset required for manual penetration testing, so it’s easier – more cost effective – to just hire less skilled individuals to run automated processes and go through a manual checklist at the end. I mean, customers don’t know the difference, right? Isn’t this good enough? Many are certainly falling for it, hook line and sinker, and the mindset has started to dominate an industry that should have no tolerance for anything less than second best. In order to overcome this mindset, customers need to start asking the hard questions and evaluating their cyber security strategy: what exactly am I getting for my money? What is the risk I am facing? Am I settling with “good enough” or doing everything I can to secure my organizations and customers? The security industry needs to evaluate the value they are selling to customers and start asking some hard questions as well: is this really securing my customer? If not, do they understand exactly what they are buying or are you providing them a false sense of security? At the end of the day, hackers are leveraging the vulnerabilities of not only the organization’s network but also the security industry itself to exploit, gain access, and take whatever it is they are after. Let’s not make it easier for them. Related content brandpost Modern Cyberattacks: Tradecraft on Your Network Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn By Wesley McGrew Jul 27, 2017 3 mins Security brandpost Being a Compliant Victim of Cybercrime Security must extend beyond mere compliance to protect the entirety of your business. Weu2019re talking about offense-oriented testing of your whole network. rn By Wesley McGrew Jul 27, 2017 2 mins Security brandpost Cybersecurity Spending: Are You Patching Holes or Checking Boxes? Cybersecurity spending is a complex question that really comes down to your needs. There is always a vendor waiting in the wings to sell you anything, so ask these key questions before you make any investment. rn By Brad Fuller, Director of Operations Jul 20, 2017 4 mins Security brandpost Their Breach is Your Breach As password policies become ever-stronger, users have a more difficult time committing them to memory. The most popular workaround is password reuse, a technique that hackers can leverage to breach your systems and servicesu2014as easily as those you By Wesley McGrew Jul 18, 2017 3 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe