Sun Tzu's 13 lessons to combat hackers

Staff Writer
Follow google news
Page 6 of 14  |  Single page

Complexity is your enemy, simplicity is your ally

Sun Tzu's 13 lessons to combat hackers

"He wins his battles by making no mistakes.  To secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself."

The complexity of technology is the enemy of information security especially where it converges into a system. And it's easy to make mistakes through misconfigurations and process omissions.

Technology convergence has business advantages such as initiating change and efficiencies, so we'll see more of it.

From a risk-management perspective, it is a way to integrate risk and compliance processes. The simplicity of a single framework should lead to lower risk because it is easier to understand and control.

In security, as in battle, mistakes in strategy or tactics are devastating. Our goal is to ensure that our security strategies and tactics are well thought out, implemented properly and routinely verified.

This puts a heavier burden on our attackers.

Although bad guys are clever and skilled, they will only spend so much time on a target before moving on to an easier target. 

Even for bad guys, time is money.

An element out of place can open a door to hackers.
   An element out of place can open a door to hackers. photo: Nate Cochrane

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Australian chief at US defence contractor L3Harris sold exploits to Russia

Australian chief at US defence contractor L3Harris sold exploits to Russia

Vic gov agencies flying blind on server security, audit finds

Vic gov agencies flying blind on server security, audit finds

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Log In

  |  Forgot your password?