SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Don’t Let Cybersecurity Perfection Become The Enemy Of Progress

Don’t Let Cybersecurity Perfection Become The Enemy Of Progress
Muhammad Chbib
Muhammad Chbib
Contact company
Contact Autobahn Security
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Cybersecurity perfection can lead to misallocated budgets and overwhelmed IT teams.
  • Focus on significant threats; perfectionism can hinder productivity and innovation.
  • Businesses should prioritize vulnerability mitigation over exhaustive, unrealistic security measures.
Related Links
  • What Are The Latest Technology Trends In Biometrics?
 
What would it take to make an office building perfectly secure, with 100% impregnability? Would you put padlocks on every door and window, and security gates in every corridor? Certainly, this would be very secure, but it doesn’t take a security expert to see how such a setup would be a huge waste of resources, nor would it be convenient for the people who need to work in the building. 

Cybersecurity challenges 

​But while most businesses recognize that complete perfection in physical security is neither realistic nor desirable, they often fail to make the same judgment when it comes to their cybersecurity arrangements. 

In their quest for perfect cybersecurity, the vast majority of organizations end up with misallocated budgets, poor prioritization, or completely overwhelmed IT and security teams, resulting in these organizations suffering from cybersecurity paralysis.

Cyber threats

A steady stream of stories relating to cybersecurity and data breaches has caused businesses to enter panic mode

​Certainly, cyber threats are a major problem, with the global costs associated with cybercrime predicted to rise to $10.5 trillion by 2025.

However, the steady stream of alarming news stories relating to cybersecurity and high-profile data breaches has caused many businesses to enter panic mode. This is exasperated by the overarching narrative from the media and security industry that “nobody is safe” when it comes to hacking.

Measured and sober risk assessments

While it is true that all organizations are technically “hackable”, it's important that they make measured and sober risk assessments when it comes to their cybersecurity.

They need to look at the bigger picture: cybercriminals tend to focus their efforts primarily on the most valuable and highest-yielding targets. As such, striving for cybersecurity perfection is simply unnecessary for a large swathe of the business community.

Physical and digital security

This is true for both physical and digital security: perfection can easily become the enemy of progress. Ultimately, trying to be perfectly secure is unrealistic and unachievable. Chasing such a goal is likely to cause a massive detriment to both productivity and innovation.

Rather than pursuing perfection, organizations must adopt a pragmatic approach to making themselves less vulnerable and focus their energy primarily on the risks that matter most to cybercriminals This more measured and strategic approach to cybersecurity is likely to produce the most efficient benefits, while also protecting and ensuring the organization's capacity for innovation and productivity.

​In the grand scheme, most companies will not get hacked

Hackers will select the easiest targets in terms of stealing data or extorting money

​It is important to recognize that cybercriminals are rational actors. Hackers will select the easiest targets in terms of stealing data or extorting money.

For instance, unless a new website can generate a large amount of revenue, there is no urgent requirement to make it 'perfectly secure', because the majority of hackers will not be interested in attacking small, unprofitable targets. 

Vulnerabilities 

But how can a company tell whether they are an easy target or not? Often, businesses will invest in scanning tools that indicate how many vulnerabilities exist within their infrastructure to gauge their current situation.

However, simply knowing the number of vulnerabilities that exist across their websites or systems is only the first step, and is necessarily useful information. If an IT department is told there are 100 vulnerabilities, what should they do with that data? Is that a lot, or is it very little? 

How serious are these vulnerabilities and which ones should be prioritized? 

​Instead, benchmarking can be a more useful metric, by showing an organization how “hackable” they are compared to their peers. Instead of trying to fix every vulnerability, companies just need to ensure they remain above the industry average for hackability, as this will help decrease the likelihood of an attack as cybercriminals are more likely to go after softer targets.

Also, companies can set milestones in the development lifecycle of their new apps and products to decide the right time to introduce robust cybersecurity measures. This will help organizations prioritize their cybersecurity efforts to maximize their impact.

Walking a tightrope: balancing risk aversion with innovation

Businesses do not allow overzealous cybersecurity measures to harm their capacity to innovate

​As the CEO of a cyber security service provider, here is my somewhat controversial opinion: security is not the most important part of any business. Of course, the threat from cybersecurity is rising, so every organization must implement a robust security strategy.

However, it is also vitally important that businesses do not allow overzealous cybersecurity measures to harm their capacity to innovate, take risks, and embrace new tools and technology. Unfortunately, this is the case within many organizations. 

Addressing vulnerabilities 

Today, CSOs, CISOs, and IT leaders face many competing priorities within their organizations. They are pulled in multiple directions and are expected to juggle an overwhelming amount of information while also making quick decisions to ensure all vulnerabilities are addressed.

As a result, many are suffering from burnout and are deciding to quit the industry altogether. 

Risk-averse approach

Meanwhile, others have adopted “healthy paranoia” in their efforts to defend against the growing number of security threats in existence. This leads them to become resistant to adopting new technology and being extra forceful with their input.

This risk-averse approach is akin to using a sledgehammer to crack a nut: a disproportionate amount of effort that results in unintended negative impacts on other parts of the organization. 

Tunnel-vision approach

​While risk aversion can be healthy, implementing overzealous security measures are likely to stifle company culture

​While risk aversion can be healthy, and it is in the best interests of a company to invest in cybersecurity, implementing overzealous security measures are likely to stifle the aspects of a company culture that can lead to global success.

A tunnel-vision approach to security that neglects innovation in favor of preventing total disaster could produce a culture without the aptitude for innovation or the appetite for taking chances on new ideas. This will demoralize the workforce, leading to lower productivity as the company is too fearful to take worthwhile risks, all of which are harmful to a company’s long-term survival as it loses market share to more fearless competitors. 

​Cybersecurity is a marathon, not a sprint

​Fortunately, businesses do not need to panic when confronted with the scale of cybercrime, because for most organizations the risks are much lower than they may assume. Security experts can see threats around every corner, and while this is an important skill, it also needs to be kept in check. 

Businesses must regularly take a step back and regain a sense of perspective on which risks are real and imminent, and which may become a danger in the future but do not require immediate measures. 

Risk assessment 

Companies can improve their cybersecurity incrementally, rather than race to fix every vulnerability

Of course, that is easier said than done, but there are tools and services on the market to help organizations assess risk realistically while providing warning of potential threats. This way, companies can improve their cybersecurity incrementally, rather than race to fix every vulnerability as soon as it is discovered.

By equipping IT teams with such tools, companies can take the necessary steps to reduce the risks of a cyberattack in the long term while spending fewer hours and resources on cybersecurity, thus ensuring budgets are spent more effectively.

A balanced perspective on cybersecurity

​Security experts and their companies need to think rationally from a hacker’s perspective about which risks will lead to genuine harm and which are purely speculative. 
 
By adopting a more balanced perspective on cybersecurity, businesses can focus on pursuing opportunities and innovation without unnecessary paranoia. A healthy dose of fear can be a good thing, but developing strong, sensible, and sustainable security foundations require practicing moderation and reason, not perfectionism. 

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Office surveillance
  • Residential security systems
  • Office security systems
  • Office security
  • Physical security
  • Industrial security
  • Remote security
  • Commercial security
  • Security management
  • Security policy
  • Security tagging
  • Security monitoring system
  • Network monitoring
  • Remote video monitoring
  • Identity management
  • Industrial security systems
  • Security service
  • Industrial surveillance
  • Cyber security
  • Crime prevention
  • Video Management System
  • Internet of Things (IoT)
  • Crowd Management
  • Corporate Security
  • Indoor Security
  • Home Security Systems
  • Central Monitoring
  • Data Security
  • Warning Devices
  • IP transmission
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • Smart home
  • Smart Cities
  • Related links
  • Articles by Muhammad Chbib
  • Related categories
  • Video Surveillance software
  • Access control software
  • Gates
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Expert commentary
About this page

Don't strive for perfect cybersecurity, focus on making progress against threats. Constantly evolving threats necessitate flexible security strategies that can adapt to changing risks.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec