Does one size really fit all?

One size “might” fit all when it comes to stretchy exercise pants or perhaps socks, but when it comes to things that really matter, that claim is a bit dubious. If you’re shopping for a security solution and you’ve come across claims from security vendors that they've got you 100% covered, take it with a grain of salt. A solution sold to the masses simply cannot apply in every situation.

Our approach includes a secure foundation as a base, but we’ve realized that a “one size fits all” approach is impossible. The number of variables and permutations of each company's IT and Information systems makes this completely unrealistic.

When it comes to security, there are common factors and solutions that need to be in place:

  • A database with updated virus and malware signatures. Implementation of machine learning and AI to identify “0-day exploits” for complete protection.
  • Policies and procedures that account for and protect against the “human factor” – employees with local administrative privileges, social engineering including malware and evendisgruntled employees.
  • A clearly defined disaster recovery plan including a backup and storage policy with a defined testing schedule.
  • Strong entropy is a mandatory component. If a solution is built without taking entropy into account, you can only expect failure. Entropy is the foundation that needs to be accounted for as there is a direct and undeniable relationship between entropy and the effective protection of information.

However, every company’s security poses unique challenges that need to be accounted for.

When you account for just 9 different factors in a relatively small company, there are 18,023,051,743,488,000,000 different permutations possible.

A “one size fits all” approach

This site uses cookies. Please read our Privacy Policy