{"id":48,"date":"2004-03-03T00:00:00","date_gmt":"2004-03-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/03\/business-thrives-on-dangerous-roads\/"},"modified":"2021-12-30T11:36:23","modified_gmt":"2021-12-30T11:36:23","slug":"business-thrives-on-dangerous-roads","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/03\/business-thrives-on-dangerous-roads\/","title":{"rendered":"Business Thrives on Dangerous Roads"},"content":{"rendered":"<p>Forrester offers some sensible security advice: put systems in place that will help you to understand and analyze events, to respond to them efficiently and effectively, and to recover quickly because bad things will happen, no matter what you do.  However, to try and eliminate every exposure will be very costly, and probably impossible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The better approach is to take some risks, and focus on your core mission: doing business efficiently and aggressively in the competitive marketplace.  One of the risks of doing business while connected to the Internet is that bad things will happen occasionally.<\/p>\n<p>Your organization may be one of the unlucky few that suffers a loss of personally identifiable information such as customer names and credit card numbers.  Even during the worst moments of the Blaster or Slammer attacks, the companies and government agencies with the best event management programs suffered little.<\/p>\n<p>The 100th dollar you spend has less relative impact than the 1st.  Therefore, it is not the size of your security budget that matters, but the effectiveness and efficiency of your security choices.  It is very tempting to buy products or services because you are afraid of the next security vulnerability.<\/p>\n<p>Success lies in not over-spending on security nor making the security architecture so complex and extensive that it cannot be managed efficiently.<\/p>\n<p>More info: http:\/\/www.csoonline.com\/analyst\/report2306.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/48\/revisions"}],"predecessor-version":[{"id":2535,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/48\/revisions\/2535"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}