{"id":4135,"date":"2017-05-30T14:36:38","date_gmt":"2017-05-30T13:36:38","guid":{"rendered":"https:\/\/cybersmart.com\/?p=4135"},"modified":"2021-10-10T13:01:12","modified_gmt":"2021-10-10T13:01:12","slug":"one-cyber-security-solutions","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/","title":{"rendered":"Why you don’t need the Next Generation Cyber Solutions"},"content":{"rendered":"

With the latest media attention on cyber security incidents and data breaches, I hope you agree with me when I say that we are past discussing the importance of data protection and cyber security. If you still think cyber security is not relevant for start-ups and SMBs, come back next week and let me convince you that it truly matters.<\/p>\n

Picture this: a pig, covered in fluffy fur, that lays eggs and gives milk. In German, this is called \u201ceierlegende Wollmilchsau\u201d which is vaguely translated to \u201cJack of all trades\u201d in English. Unfortunately, I have seen this being advertised in the cyber security sector as well.
\n<\/p>\n

If you have ever looked into securing your company against cyber threats, you must have come across one of the many cyber security products or services that offer magical solutions against cyber threats.<\/p>\n

Let me tell you why you won\u2019t need (most of) them:<\/p>\n

1. We\u2019ll all get hacked (or suffer a data breach)<\/strong>
\nSooner or later<\/em><\/h5>\n

We will all suffer a data breach one day. Whether it is a multinational corporation or you as an individual, let\u2019s be honest and admit the chances of loosing data are incredibly high. How often do emails get send to the wrong recipient or contain the wrong information? Or how often do you use the same password for several different accounts?
\nIn most cases, companies or individuals don\u2019t even know that they have been part of an incident. Having said that, if you are willing to invest in Cyber Security for your business don\u2019t purchase any tools or software that will guarantee to secure you against the next generation of cyber attacks.
\nThese overall, magical solutions that protect you from malicious attackers, just don\u2019t work in real life and if you look carefully, you will understand that \u201cnext generation (fill in the gap)\u201c does not make any sense. What are the next generation cyber threats?<\/p>\n

What you can do is ask yourself \u201cWhat would happen if I get hacked?\u201d, think about the risks (i.e. \u201crisk assessment\u201d) and start with basic cybersecurity hygiene such as Cyber Essentials, for instance.<\/p>\n

2. Most of the Cyber Security solutions are built for large organisations<\/strong><\/h5>\n

With InfoSec London coming up in a few weeks, I am excited to see what new \u201cnext-generations (fill in the gap)\u201d are out there and I am quite confident that there are still not many efficient solutions for the SMB market. Last year, I was on a hunt for a phishing software that we can use at CyberSmart. Guess how many I found for small teams? ZERO.The smallest offer I have received was for a minimum of 100 monthly users. Unfortunately, that is the same for intrusion detection, risk assessment tools and more.
\nThat it is not acceptable! There are so many solutions available on the market already, and hardly anyone meets the needs of SMBs.<\/p>\n

Side note: If you are a building cyber security solutions and you have a great product that can benefit start-ups and small businesses (and is reasonably priced) contact\u00a0us!<\/p>\n

3. Technology will not save us\u00a0<\/strong>
\nWe need people and policies as well\u00a0<\/em><\/h5>\n

We often hear that humans are the biggest threat to cyber security, but we believe that humans are also the biggest opportunity. It is true that we are not as reliable as AWS but without humans, Information Security doesn\u2019t work. Even if you have the best anti-malware, intrusion detection and threat analysis software, you will still suffer if your CFO becomes a victim of a spear phishing attack and transfers money to an unknown recipient.
\nWe hear stories like this every day, and we hate to see companies losing money or even losing their business because of one stupid mistake. Talk about cyber security with your team and become “Secure by Culture”. If everyone in your company understands the risks and the responsibility they have towards data protection or cyber security in general, incidents can be avoided and a lot of headache, time and money can be saved. Don’t forget to think about policies and procedures that provide an anchor for your team!<\/p>\n

Protecting your data and organisation is hard work \u2014 let us help you make it easier.<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

With the latest media attention on cyber security incidents and data breaches, I hope you agree with me when I say that we are past discussing the importance of data…<\/p>\n","protected":false},"author":3,"featured_media":4136,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[8,9,10,12,14],"yoast_head":"\nWhy you don't need the Next Generation Cyber Solutions<\/title>\n<meta name=\"description\" content=\"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why you don't need the Next Generation Cyber Solutions\" \/>\n<meta property=\"og:description\" content=\"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-30T13:36:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-10T13:01:12+00:00\" \/>\n<meta name=\"author\" content=\"Jamie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\"},\"author\":{\"name\":\"Jamie\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/5f23eb4b6bf763170a51147370df2a04\"},\"headline\":\"Why you don’t need the Next Generation Cyber Solutions\",\"datePublished\":\"2017-05-30T13:36:38+00:00\",\"dateModified\":\"2021-10-10T13:01:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\"},\"wordCount\":715,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Cyber\",\"Cyber Essentials\",\"Cyber Security\",\"CyberSmart\",\"Next Generation\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\",\"name\":\"Why you don't need the Next Generation Cyber Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-05-30T13:36:38+00:00\",\"dateModified\":\"2021-10-10T13:01:12+00:00\",\"description\":\"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why you don’t need the Next Generation Cyber Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/5f23eb4b6bf763170a51147370df2a04\",\"name\":\"Jamie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c8629de96048c65a367ce1066968a8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c8629de96048c65a367ce1066968a8f?s=96&d=mm&r=g\",\"caption\":\"Jamie\"},\"url\":\"https:\/\/cybersmart.com\/author\/jamiecybersmart-co-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why you don't need the Next Generation Cyber Solutions","description":"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Why you don't need the Next Generation Cyber Solutions","og_description":"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security","og_url":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2017-05-30T13:36:38+00:00","article_modified_time":"2021-10-10T13:01:12+00:00","author":"Jamie","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Jamie","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/"},"author":{"name":"Jamie","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/5f23eb4b6bf763170a51147370df2a04"},"headline":"Why you don’t need the Next Generation Cyber Solutions","datePublished":"2017-05-30T13:36:38+00:00","dateModified":"2021-10-10T13:01:12+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/"},"wordCount":715,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage"},"thumbnailUrl":"","keywords":["Cyber","Cyber Essentials","Cyber Security","CyberSmart","Next Generation"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/","url":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/","name":"Why you don't need the Next Generation Cyber Solutions","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-05-30T13:36:38+00:00","dateModified":"2021-10-10T13:01:12+00:00","description":"With the latest media attention on cyber security & data breaches, we are past discussing the importance of data protection and cyber security","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/one-cyber-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Why you don’t need the Next Generation Cyber Solutions"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/5f23eb4b6bf763170a51147370df2a04","name":"Jamie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c8629de96048c65a367ce1066968a8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c8629de96048c65a367ce1066968a8f?s=96&d=mm&r=g","caption":"Jamie"},"url":"https:\/\/cybersmart.com\/author\/jamiecybersmart-co-uk\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4135"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=4135"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4135\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=4135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=4135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=4135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}