Technology

How You Can Protect Your Company From Hackers

Technology is not enough to combat cyber threats alone-human talent plays a critical role too
How You Can Protect Your Company From Hackers
Image credit: Pixabay
Managing director, Insight Venture Partners
4 min read
Opinions expressed by Entrepreneur contributors are their own.

 

We’ve entered a Golden Age of cybersecurity capabilities. Companies are flooding the market with high-end cybersecurity software products that gather large amounts of data. New technologies such as machine learning can make increasingly accurate predictions about when a cyberattack is taking place. Why then are powerful organizations such as Facebook, Quora, and JP Morgan still falling victim to data breaches?

In cybersecurity, defense is much more challenging than offense. Companies on the defense must secure every vulnerability, but attackers only need to find one hole. To make matters worse, the cost of launching a cyberattack continues to decrease, as hackers have access to more sophisticated technologies than ever before. Cybersecurity threats continue to evolve, and as they become more sophisticated, it will become more challenging to stop them. By taking a bird’s-eye view of potential cybersecurity risks, defenses and implementation processes, companies can best identify their weakness and move quickly to address the risks. 

 Use best-of-breed, but fill the gaps in your patchwork system

As we have seen in recent headlines, cyberattacks can take the form of intricate, highly organized plots or can simply exploit careless behaviour. Currently, the best cybersecurity technology is being built by highly specialized growth-stage vendors focused on gathering certain types of data, training learning systems that recognize anomalous behaviour and quarantining systems when a breach is detected. They can effectively sniff out attacks and cut off vulnerabilities before breaches inflict damage.

The level of innovation cybersecurity companies are developing is extraordinary. However, it leaves the responsibility of integrating different products to the customer, or to security consulting firms. Cobbling together different tools can be a challenge – but today it’s a necessary one to overcome.

Follow the economic power

When it comes to cybersecurity, both customers and investors should try to find vendors with products that benefit from “demand-side economies of scale”—products that get better as more people use them. It matters how quickly the product is improving, not only how good it is today.

Many larger, legacy cybersecurity companies have lost technical talent and the ability to build high-caliber products. Their investor bases often want a return of capital instead of investment in new capabilities—a major disadvantage when dealing with evolving cyberthreats.

On the other end of the spectrum, very early stage venture-backed companies are innovative, but they often lack the scale and maturity to support large multinational corporations or governments as customers.

Growth-stage vendors are in a “sweet spot”, in that they can build best-in-class, innovative products that improve as more customers use them, and yet they are substantive enough to handle the most demanding customers.

These companies can make better investments, and the scale leader in each cybersecurity domain can have a considerable economic moat.

And customers profit from using the product that is improving the most quickly, benefiting from the “herd immunity” that comes from using the most widely-deployed cybersecurity product.

Final steps to implementation

Technology is not enough to combat cyber threats alone—human talent plays a critical role, too. Cybersecurity tools are often complicated and require the retraining of human capital, including at the most senior levels of leadership. Organizations need to have a plan for keeping employees up-to-speed on new cybersecurity tools. 

The companies with the best cyberdefenses today employ a blend of human talent and technology working together. Technology gathers data and makes predictions; humans exhibit judgment and take action.

A look ahead

In 2019, expect cybersecurity technology to journey beyond just monitoring, generating alerts and issuing quarantines of systems and data—new capabilities such as obfuscation (intentionally confusing attackers) and adaptive systems will allow cybersecurity technology to automatically respond to attacks.

The quality of cybersecurity software predictions will improve as machine learning systems benefit from more usage, better data, granular feedback and improved algorithms.

Meanwhile, the human machine interface in cybersecurity will also be refined, as software becomes more intuitive to use and easier to understand.

Finally, expect to see industry consolidation as customers demand integrated best-of-breed capabilities. They do not want to cobble together products themselves or settle for mediocre bundles from legacy vendors.

The future looks bright for growth-stage cybersecurity vendors bringing innovative solutions to market. Economic power and access to data will continue to drive this segment forward, and for companies looking to defend themselves from threats, investing in this “sweet spot”— powerful products from growth-stage cybersecurity vendors—is a smart approach.

More from Entrepreneur

Elizabeth's expertise can help you scale your business, build a personal brand and focus on being a value-driven CEO.
Book Your Session

In as little as seven months, the Entrepreneur Authors program will turn your ideas and expertise into a professionally presented book.
Apply Now

Are paying too much for business insurance? Do you have critical gaps in your coverage? Trust Entrepreneur to help you find out.
Get Your Quote Now

Latest on Entrepreneur

My Queue

There are no Videos in your queue.

Click on the Add to next to any video to save to your queue.

There are no Articles in your queue.

Click on the Add to next to any article to save to your queue.

There are no Podcasts in your queue.

Click on the Add to next to any podcast episode to save to your queue.

You're not following any authors.

Click the Follow button on any author page to keep up with the latest content from your favorite authors.