Cybersecurity’s Unanticipated Benefits

Cybersecurity’s Unanticipated Benefits

Longtime readers of this newsletter may assume that the only professionals I ever call to my house for assistance are plumbers. That’s understandable, I’ve written before about my plumbing challenges here and here.

But it’s not just plumbers I bring in. When it comes to electricity, I know better than to take my chances – I hire a professional.

Such was the case last month when I decided to up my Wi-Fi game and transition our house from a consumer set up to something more along the lines of what a small business might run in their office. I had a few reasons: I wanted more control over security; I wanted to segment the network for different people and purposes; I wanted to discourage (okay, prevent) my kids from going certain places and doing certain things.

So I called Jeff, our friendly electrician, and asked him to come over and pull some Ethernet cables around the house – behind the walls and out of sight. He did a great job and, as long as Jeff was already there, I asked him to do a few other things…

He added three new outlets in our bedroom (including a USB outlet), making it easier to keep our various devices charged.

He ran a wire behind the wall where our basement television lives and connected it to the Roku.

He added an outlet in the basement behind our dehumidifier, eliminating the extension cord and associated tripping hazard that had been there since we moved in.

Each of these additional, unplanned things brought with them benefits, whether in the form of added convenience, improved appearance, or safety. And yet, none of these improvements were big enough, in and of themselves, to have warranted bringing in an electrician.

The fact is, were it not for my need to have some Ethernet cables pulled, I would never have realized any of these other things.

When You Improve Your Security, Other Things Improve Too 

When it comes to security enhancements, most people expect a corresponding loss in convenience. Multifactor Authentication (MFA), unique and complicated passwords, door entry badges … these things and others like them may elevate security (they do), but they add a degree of overhead as a result.

But, as with my visit from Jeff the electrician, there are benefits, many of which are likewise unanticipated. Some examples…

Internal audits. These may uncover users in the system who should no longer be there, whether past employees, contractors, or something else. Not only does removing these accounts prevent past users from gaining access, eliminating users can result in reduced license fees.

Code reviews. In addition to the primary purpose of identifying security vulnerabilities, code reviews often improve functional problems, such as a web form that is difficult or unintuitive to complete by legitimate users. 

Vendor reviews. When reviewing vendor performance, you may find they are doing an excellent job at security. But you may also realize that you have two vendors providing overlapping services to different departments and would benefit by consolidating functions and letting one go. What begins as a cybersecurity project turns into a cost-saving and streamlining exercise.

Cybersecurity Touches Everything

One of the often overlooked and underappreciated benefits of a cybersecurity focus within an organization is that because cybersecurity is by nature an “in the weeds” discipline, attention paid in this area invariably uncovers other, unrelated benefits.

And while many of these benefits may be small on an individual basis and generally unexpected, they add up to across the board improvements and enhancements to your business.

(Side note to Jeff the electrician: I forgot to ask you to install a dimmer in the basement. No worries, we’ll get it done the next time we have you over for something more significant!)


Want to get great cybersecurity content delivered to your inbox? Click here to sign up for our monthly newsletter, Tales from the Click.

This article originally appeared on the Fractional CISO blog.

Kevin Borders

Founder and CEO at minware

9mo

I think it’s still a cost center though. Sure, messing it up can interfere with revenue and efficiency, but the same is true for other “cost centers.” The test I would use is whether you can keep increasing revenue indefinitely the more money you put into it like you usually can with sales and marketing. Unless your product is a security product or targets a niche audience that’s highly security-conscious, the answer is going to be no.

Bill Richardson

CISO and CTrO | Security, Privacy, HIPAA, AI Governance

9mo

Rob Black when I engage with a small or early stage firm as CISO, most of the other C levels view risk management, security and privacy as a cost center. In a sense that's true. We are not a capital expenditure. Like all other compliance groups, we are "revenue enablers" - if we don't do our job many firms may not realize revenue.. If it's regulatory the firm is at financial risk and possible criminal penalties for the C level. If third-party (contractual) compliance the firm likely won't be offered or allowed to retain contracts for products or services. That meets my definition of valuable and essential to me. But I'm biased 😁

Bryan Sullo

I professionally prevent “Oops!”

9mo

I concur with everything you wrote in your post. I have one question though. When it comes to the “A phishing attack recently cost Comparable Co. $1.2M in damages," conversation . . . I haven't found a good source for specific numbers like these in the SMB space. Got any suggestions for where to look?

Like
Reply
kurrapati S.

SME | Network Engineer | AWS, CySA+ | Generative AI

9mo

This is a crucial perspective shift! Highlighting the revenue-driving and efficiency-boosting aspects of cybersecurity, in addition to risk mitigation, is key to gaining leadership buy-in.

Robert E. Wiley Jr. PhD(c) GRC Cybersecurity

GRC Engineer ⚙️ & PhD candidate in Cybersecurity | Architect 🧭 of Convergent Governance | Warrior-Forged Strategist ⚔️ Designing Enduring Systems of Trust, Resilience & Transformative Purpose 🛡️ Click to connect!!

9mo

This has a build-up to the FAIR framework....LOVE IT!!!

To view or add a comment, sign in

More articles by Rob Black

  • Will Artificial General Intelligence (AGI) Happen Soon?

    No. Wait, you were looking for an explanation? No problem! The Large Language Models (LLMs) that power today’s AI…

    6 Comments
  • The Certainty of Uncertainty

    Rachel and I had tickets last month to see the Goo Goo Dolls at Leader Bank Pavilion in the Boston Seaport. With the…

    5 Comments
  • Much Ado About Nothing

    We just got back recently from our annual family trip on the Cape. We had an amazing week of fun in the sun.

    4 Comments
  • Vendors on the Edge

    It was just after dinner last Sunday evening when my wife gave me the news: She was leaving me. So I did what any…

    5 Comments
  • The Fall of SOC 2

    I’ve been an Amazon customer since the late 90s, back when books were all they sold. Over the years, I have ordered…

    19 Comments
  • Know Your Audience

    Regular readers of this newsletter (thank you!) know I usually begin with a personal story – something in my life that…

    11 Comments
  • Do You Need a Cybersecurity Compliance Tool?

    I got an email the other day from QuickBooks, our accounting system provider. They were thanking me for our recent…

    12 Comments
  • Different Circumstances, Different Solutions

    “Don’t you have a snowblower? Why are you shoveling?” asked my friend, Larry. The answer, as I explained to him, is a…

    5 Comments
  • When Things do Go Wrong

    This month, sadly, Tales From the Click has one fewer superfan. That’s because my wife Rachel’s Uncle Cliff passed away…

    10 Comments
  • Cybersecurity Needs Your Attention

    December. That magical time of year when so many conversations turn to… … the pick and roll, great team defense, smart…

    3 Comments

Others also viewed

Explore content categories