Trust But Verify – Part 2

Trust But Verify – Part 2

Blocks with the word trust

 

What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a prominent political leader? This one is former US President Ronald Reagan. And his statement, trust, but verify. I’m sure you remember him and likely the conditions under which he uttered those now-famous words.

But how does this apply to cyber? I’m so glad you asked! I have an example that I hope will resonate. Well, it’s likely that in cyber, you have a dashboard. Honestly, you have a bunch of dashboards. And, when you look at your dashboard, it tells you how well things are doing, perhaps how well agents are phoning in and giving status or giving an update, and communicating into your dashboard.

Looking at your dashboard, things look like they’re updating, but how do you know? How do you really know? How might you not just trust but verify that they are actually? They are phoning into the dashboard or have done so in the last few hours. It reminds me of a question I created several years ago. Feel free to use it.

The question is this – “how long can you stand to not know”? As in, how long can you stand to not know those agents – you know, the ones I’m talking about – have not phoned in recently to your dashboard? So what’s the habit that I believe you can install this week?

It’s simple. Put a weekly recurring calendar reminder to do a manual check, a weekly calendar reminder to not just trust, but to verify those agents are phoning in, in this case, a check to make sure that the security agents that are supposed to report into your dashboard are well reporting into your dashboard.

Yes, there’s some manual labor. Yes, this practice has saved me more than just a few times to trust but verify. And when you do that, you can likely be more effective in cybersecurity and also get wisdom as cheaply as you can. 

I have talked about this topic once before.

What are you doing to Trust But Verify in your company? Please share with us in the comments section below.

Subscribe to our email list to get more cybersecurity content and information on our weekly events delivered to your Inbox!

Russell

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.