<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

Security vs Compliance ... is there truly a difference?

Posted On: August 21, 2018

Topic: Security

compliance chalk board security wordsIt’s no secret... security attacks are the rise:

  • Within the past year, leading global companies have seen sales and revenue impacts as high as $300 million due to malware-based cyberattacks.
  • By 2021, at least one company will publicly acknowledge a $1 billion revenue impact from a business outage resulting from a malware/ransomware attack.
  • Mobile malware is more than doubling each year, reaching levels where it can no longer be ignored. By 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today.

To combat cybercrime, the Federal Government has released numerous compliance regulations designed to protect data and systems including Federal Information Security Modernization Act (FISMA) and Health Insurance Portability and Accountability Act (HIPAA).

Further, many industries also define requirements. Adherence to these regulations and industry standards such as Payment Card Industry compliance (PCI), is a requirement for doing business in a global market.

The result, blurred lines between security and compliance.  This article aims to clear up the misconceptions between the two and provide tips to help your organization strike a balance between being compliant and being secure.

Clearing Up the Misconceptions

Compliance=Security

 Many organizations have the mindset that being compliant makes them fundamentally secure. Unfortunately, that is not the case. Compliance regulations are not security programs. Compliance demonstrates how well your organization meets security-related requirements of specific regulatory standards like PCI or HIPAA.  Security on the other hand, is a collection of controls designed to mitigate risk and protect your data and applications from threats.

You can be compliant, but that doesn't mean you're secure.

“Checkbox Mentality”

 Relying on merely checking the box and being compliant will not keep you secure and puts your business at serious risk. Why?  Compliance mandates are general guidelines, but do not reflect what individual companies need in terms of security.

In addition, compliance requirements are mostly reactive versus proactive in nature, often changing slowly and predictably. The security/threat landscape however, is constantly evolving. As a result, many compliance mandates are a few steps behind the most current threats.

 Compliance is a blueprint for my security strategy

Your security strategy should be built from the ground up, based on your unique needs and centered around security principles, rather than regulatory mandates. In addition, it should include considerations in regard to how your overall business views risk.

According to Jim Kennedy, contributing author at CSO magazine, many organizations are opting to define security policies based on regulatory requirements, however the result is that their security postures become very quickly out of date. Not only are regulations typically at least 24 months old by the time they are implemented, but a compliance-only approach provides hackers with an ‘access blueprint’ – as weaknesses in the security model that are not covered by regulation are clearly visible.

Finding Alignment

Addressing security vulnerabilities and the demands of regulatory compliance isn’t an easy feat. To truly protect sensitive data, both security and compliance are critical. Without a smart, thorough and active security program, coupled with a solid compliance plan, you’re at significant risk of being breached. And, while seemingly very different, security and compliance can work in harmony to achieve a common goal- ensuring the privacy and protection of your sensitive data.

A structured approach to security and compliance starts with understanding security, risk  and  requirements unique to your business and your industry, measured against defined areas for assessment

Katie McCullough, Chief Information Security Officer here at One Neck, outlined the following basic principles:

Document Your Processes

Documentation is a key element of compliance and security. If it’s not documented, then it’s not really happening. Neglecting to document guarantees that the security and compliance programs will never function in unison as one.

Train

Training your user base to adhere to security and compliance best practices is a must. Develop an awareness training program that provides users with education on policies and procedures.

Measure Effectiveness

Make sure you are measuring effectiveness of your security and compliance initiatives. Measure process performance and controls against your established guidelines.

Improve Processes

Implement a continuous improvement process. By leveraging the metrics obtained when measuring your performance, you can facilitate continuous improvement by applying corrective actions based on your observed measurements.

OneNeck Has You Covered

Clearly understanding where you are and what vulnerabilities exist can save significant time, money and distress down the road when under attack or trying to achieve compliance. Don’t go it alone. We’re here to help you stay safe from emerging risks that leave you exposed, while allowing you to maintain a balance of productivity and operational effectiveness.

eguide-icon

Hybrid IT a Winning Strategy

Hybrid IT infrastructure that combines on-premises and public cloud capabilities is a strategy many enterprises are embracing. Download Now

blog

Digital Transformation – An Imperative or Simply a New Buzzword?

Why is it important for organizations to embrace digital transformation? Just ask anyone that once worked for Blockbuster. It’s not that we quit... Continue Reading