{"id":2887,"date":"2015-10-28T15:06:37","date_gmt":"2015-10-28T15:06:37","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2015\/10\/28\/cyber-security-back-to-basics\/"},"modified":"2024-02-06T13:14:08","modified_gmt":"2024-02-06T13:14:08","slug":"cyber-security-back-to-basics","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/","title":{"rendered":"Cyber Security: Back to Basics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2887\" class=\"elementor elementor-2887\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a7448b3 e-flex e-con-boxed e-con e-parent\" data-id=\"6a7448b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c9d5005 elementor-widget elementor-widget-text-editor\" data-id=\"3c9d5005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dave Daly, Global Head of Consultancy<\/p><p>I had the pleasure of representing <a href=\"https:\/\/www.dionach.com\/\">Dionach<\/a> at Bloomberg -Talis Capital\u2019s Cyber Security and Insurance Event <a href=\"https:\/\/twitter.com\/hashtag\/TalisCyber2015?src=hash\">(#TalisCyber2015<\/a>) yesterday (27<span style=\"font-size: 11.6667px;\">th<\/span>\u00a0October 2015) as part of the panel discussing the \u201cCustomer and Forensic Expert Perspective on Cyber Security Products\u201d.<\/p><p>One of the discussion topics was the possibility that, as an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.<\/p><p>A key point that cannot be ignored is that data breaches are being widely reported in the media with a high degree of frequency. Recent examples include the following.<\/p><p style=\"margin-left: 36.0pt;\">On 2<span style=\"font-size: 11.6667px;\">nd<\/span>\u00a0September 2015 the Independent reported, \u201cDozens of customers\u2019 private details sent to others via mass emails\u201d. WHSmith confirmed this was the result of a bug in their online contact form resulting in emails being copied to other customers, rather than a breach.<\/p><p style=\"margin-left: 36.0pt;\"><a href=\"https:\/\/www.independent.co.uk\/news\/uk\/home-news\/whsmith-data-breach-customers-report-it-glitch-distributing-peoples-personal-details-10482378.html\">https:\/\/www.independent.co.uk\/news\/uk\/home-news\/whsmith-data-breach-customers-report-it-glitch-distributing-peoples-personal-details-10482378.html<\/a><\/p><p style=\"margin-left: 36.0pt;\">On 10<span style=\"font-size: 11.6667px;\">th<\/span>\u00a0September 2015, City A.M. reported, \u201cThousands of Lloyds Premier Bank customers using Royal Sun Alliance emergency cover have had their data &#8220;stolen&#8221; in security breach\u201d. Initial investigation into the breach by RSA suggested a data storage device had been stolen from one of their data centres, and offered two years\u2019 worth of identity protection as reassurance to affected customers.<\/p><p style=\"margin-left: 36.0pt;\"><a href=\"https:\/\/www.cityam.com\/224053\/lloyds-bank-customers-data-stolen\">https:\/\/www.cityam.com\/224053\/lloyds-bank-customers-data-stolen<\/a><\/p><p style=\"margin-left: 36.0pt;\">On 1st October 2015, The Register reported, \u201cExperian had lost at least 15 million records\u201d. Initial reports indicated the records had been stolen by persons unknown, and included details on T-Mobile contract applicants between 1st September 2013 and 16th September 2015. Further details on this breach have been widely reported in the media.<\/p><p style=\"margin-left: 36.0pt;\"><a href=\"https:\/\/www.theregister.co.uk\/2015\/10\/02\/experian_t_mobile_breach_analysis\/\">https:\/\/www.theregister.co.uk\/2015\/10\/02\/experian_t_mobile_breach_analysis\/<\/a><\/p><p>Please note these examples are not a definitive list, nor an endorsement of any media or news organisation.<\/p><p>If there is one message to take away it\u2019s that companies are going about Cyber Security in the wrong way; they are investing limited money and resources in the wrong places. While <a href=\"https:\/\/www.dionach.com\/response\/cyber-security-incident-response\">forensic investigations<\/a>, <a href=\"https:\/\/www.dionach.com\/compliance\">enforced compliance<\/a>, additional <a href=\"https:\/\/www.dionach.com\/services\/assurance\/penetration-testing\/\">vulnerability analysis<\/a>, and more highly qualified security professionals have their place, they are only effective if the following question is considered carefully and answered first.<\/p><p><strong>What are we trying to achieve?<\/strong><\/p><p>A deceptively simple question, but the answer is more complicated. At the heart of this question is formulation of a defined Cyber Security strategy that has support, sponsorship and buy-in from Board level. The key points to address are:<\/p><ol><li>Identify your security objectives;<\/li><li>Decide what you are prepared to do and invest;<\/li><li>Decide what you are prepared to accept as an intrinsic risk of doing business;<\/li><li>Determine how you will track your course;<\/li><li>Implement effective information governance;<\/li><\/ol><p>Once these points are in place, the next step is to implement an effective information security management framework. There are a number of models that can be applied, with different regions and industry sectors preferring particular standards, but a popular option is the international standard for information security management systems, <a href=\"\/services\/compliance\/iso-27001\/\">ISO 27001:2013<\/a>.<\/p><p>Once these fundamental processes are in place, determining where to spend limited budgets to maximise the return on investment from Cyber Security solutions will become considerably more obvious, the increased resilience of the company will help increase the bottom line over the lifetime of the business, and the cultural embedding of Cyber Security will be something that demonstrates a true market leader.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[213],"class_list":["post-2887","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-forensics","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security: Back to Basics<\/title>\n<meta name=\"description\" content=\"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security: Back to Basics\" \/>\n<meta property=\"og:description\" content=\"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-28T15:06:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T13:14:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Cyber Security: Back to Basics\",\"datePublished\":\"2015-10-28T15:06:37+00:00\",\"dateModified\":\"2024-02-06T13:14:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"keywords\":[\"forensics\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/\",\"name\":\"Cyber Security: Back to Basics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"datePublished\":\"2015-10-28T15:06:37+00:00\",\"dateModified\":\"2024-02-06T13:14:08+00:00\",\"description\":\"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/cyber-security-back-to-basics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security: Back to Basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security: Back to Basics","description":"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/","og_locale":"nl_NL","og_type":"article","og_title":"Cyber Security: Back to Basics","og_description":"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.","og_url":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2015-10-28T15:06:37+00:00","article_modified_time":"2024-02-06T13:14:08+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Cyber Security: Back to Basics","datePublished":"2015-10-28T15:06:37+00:00","dateModified":"2024-02-06T13:14:08+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/"},"wordCount":582,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"keywords":["forensics"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/","url":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/","name":"Cyber Security: Back to Basics","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"datePublished":"2015-10-28T15:06:37+00:00","dateModified":"2024-02-06T13:14:08+00:00","description":"As an industry, we are vulnerable to being dazzled by new technologies, distracted by future trends, and overwhelmed by threat intelligence and security analytics data. In doing so, we are in danger of losing sight of the fundamentals of cyber security.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/cyber-security-back-to-basics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Cyber Security: Back to Basics"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Kz","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2887"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2887\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}