Please enter your email to subscribe. By doing so, you are opting-in to receive news from Guidepost Solutions LLC.
Knowing what to expect is a great way to avoid trouble. We drive our cars safely because we have learned what the dangers are. We check side view mirrors before changing lanes. We use mirrors and turn around to back up safely. We slow our rate of speed when conditions get slick. At least we should do all these things and we are safer when we do. Nevertheless, accidents still happen, especially when the other driver is being reckless. Indeed, sometimes no matter how careful we are, we can still become accident victims.
The same conditions exist in cyberspace. By now every person and every organization that uses a computer should have some sense of where the dangers are. Undesired email advertising can be annoying, like driving behind someone who is going too slowly. But malicious spam is more like someone driving in your blind spot. Unless you are aware of the risk and careful enough to lean forward and improve your range of vision to the side, you may not sense the danger lurking right next to you. You must be able to anticipate the dangers to minimize the risk.
So you keep your car in good mechanical condition and drive defensively. But danger can still arise from other drivers who are speeding, driving erratically, distracted or under the influence of some substance that inhibits their control of their vehicle. You can look out for them but you cannot control them. In fact, you have no control over the fact you are required to share the road with them. They are a risk you can be on the alert for but cannot prevent.
In the data processing world, we call these other drivers our third party vendors. Every one of them creates risk as we share the digital highway with them. When a vendor supplies services we need to process our data and service our clients, they might just be the equivalent of a driver who appears to be okay and unexpectedly becomes a risk. So to be safe we must anticipate predictable risk.
When we drive we cannot be certain that the other drivers have cars that are in good condition, but in this respect the cyber world has an advantage. We can ensure the right to test to security of a vendor’s system. We can address liability for a breach as a term of contract. We can require a vendor have cyber risk insurance, just like other drivers should (but of course our policy must have a provision covering us if they do not, just like for your car).
Before you get a license, you get trained on how to drive. Periodically, you should refresh your defensive driving skills with an approved course. It saves on your insurance and may save your life.
Kenneth C. Citarella is senior managing director for the Investigations and Cyber Forensics practice at Guidepost Solutions LLC. He has more than 30 years of experience investigating and prosecuting white collar crime and computer crime. Kenneth can be reached at email@example.com.