by Shoaib Yousuf, Managing Director & Partner, Boston Consulting Group (BCG)
Contrary to popular belief, an organisation’s IT security isn’t a setting that comes switched on by default. Actions need to be taken before an organisation can claim that its business is secure. The corollary to this is that even though an organisation might have policies, procedures, and technology in place for it to consider itself secure, that state will only last as long as they aren’t degraded by external forces. This picture has interesting parallels with Newton’s laws of motion, which have formed the bedrock of classical mechanics since they were first stated by the famed scientist in the late 17th century and led scientists to an awakening in the way that we understand the world and progress through it.
The first law of motion states that an object will remain at rest or in continuous motion (inertia) until acted upon by another force. The second law states that if acted upon by said force, the rate of change of its momentum will equal the size of the force. And lastly, the third law states that all actions will have equal and opposite reactions.
Organisations can gain a valuable perspective from the story contained in these three simple statements. Like anything with mass, they too will remain at inertia, or in an insecure state, until they are attacked. To have adequate security they need to adopt a speed of change equal to perceived threats. This is because for every incident an equal and opposite reactionary measure will be required to mitigate it.
Why hasty measures don’t work
Security (or bad security) is, more often than not, a series of reactionary measures put into place by organisations that do not take time to develop a holistic security solution which incorporates measures of risk and reward. Typically, this is the result of someone in an organisational ‘food-chain’ under heat from someone else above them. This heat trickles downhill until someone makes something happen only to be make it seem as if action is being taken, regardless of the effectiveness of that action. This creates the perception of a uniform level of security protection for the organisation, and routine maintenance provides the further appearance of adequate provisions being taken to overcome the negative influence of outside forces.
The majority of organisations that attempt to drive changes out of a reaction to an incident yield little in the way of long-term security benefits. Organisations and their decision-makers who have already dealt with such incidents need to ask themselves some tough questions: Was the incident predictable? Was there no way to have pondered the possibility of this type of incident in the past? Could policies or procedures to mitigate the damage have been implemented if the budget, resources, or time to implement them existed before the incident?
How to build a sustainable security framework for your organisation
There is one more parallel that begs to be drawn from Newton’s law of gravitation: that every particle attracts another with a force proportional to the product of their masses inversely proportional to the distance between them. Putting mathematics aside to express the situation more simply, a large organisation can expect to attract threats in line with its size, especially if it is already particularly vulnerable to them.
Security measures that need to be implemented in haste will always consume more resources than proactive, rational, and thought-out security measures that are implemented over time. Analyse your risk scenarios and implement measures to mitigate risks before they manifest – and make sure to allot plenty of time to doing so.
If organisations plan ahead, work to mitigate risks before they occur, and provide training and awareness of security measures and policies, they can reduce the negative impact that hasty reactions can have. It is impossible to eliminate reactionary thinking entirely, but rather than allowing reflexive decision-making to dictate their course, organisations should use them to strengthen their position by implementing policies and procedures that improve security processes for the long-term.