{"id":250,"date":"2017-06-10T13:07:00","date_gmt":"2017-06-10T13:07:00","guid":{"rendered":"https:\/\/securityeverafter.com\/2017\/06\/10\/an-occasional-look-in-the-rear-view-mirror\/"},"modified":"2023-02-01T09:55:23","modified_gmt":"2023-02-01T14:55:23","slug":"look-in-the-rear-view-mirror","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/","title":{"rendered":"Look in the Rear View Mirror"},"content":{"rendered":"

\"Rear<\/p>\n

Look in the Rear View Mirror<\/h1>\n
How often do you look in the rear view mirror? With two new drivers in my home, I am training them to occasionally look in their car’s rearview mirror as an effective way to increase their situational awareness when driving. What if this principle were applied to hardware and software inventory? Perhaps in the form of a quarterly reminder to consider CIS Critical Security Controls<\/a> 1 and 2 that called for an objective look at hardware and software that might not be as shiny and new. Intentionally searching for this type of deferred maintenance could find an unnecessary risk imposed on the entire organization.<\/div>\n
<\/div>\n
Some organizations have an interesting approach – for every new tool purchased; two tools must also be retired. What a novel section to include in the business justification for the following new tool. Take a look in the rearview mirror every once in a while – particularly in technology retirement- to ensure you don’t just increase the collection of tools. Who knows what might be discovered?<\/div>\n
<\/div>\n
What assumptions are you making?<\/a>\u00a0 What grade would you give yourself in the discipline of technology retirement? Please leave what works for you in our comments section below.<\/div>\n
<\/div>\n
I recently posted the\u00a0<\/span>below<\/a>\u00a0on the\u00a0<\/span>SANS Internet Storm Center<\/a>.<\/span><\/div>\n
<\/div>\n
Want to get more cybersecurity information in your inbox? I would love to invite you to our email list<\/a>, so you do not miss out on weekly events!<\/div>\n","protected":false},"excerpt":{"rendered":"

Look in the Rear View Mirror How often do you look in the rear view mirror? With two new drivers in my home, I am training them to occasionally look in their car’s rearview mirror as an effective way to increase their situational awareness when driving. What if this principle were applied to hardware and […]<\/p>\n","protected":false},"author":4,"featured_media":552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[30],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\nLook in the Rear View Mirror - Security Ever After - vCISO<\/title>\n<meta name=\"description\" content=\"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Look in the Rear View Mirror - Security Ever After - vCISO\" \/>\n<meta property=\"og:description\" content=\"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Ever After - vCISO\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-10T13:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-01T14:55:23+00:00\" \/>\n<meta name=\"author\" content=\"Russell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:site\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Russell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\"},\"author\":{\"name\":\"Russell\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\"},\"headline\":\"Look in the Rear View Mirror\",\"datePublished\":\"2017-06-10T13:07:00+00:00\",\"dateModified\":\"2023-02-01T14:55:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\"},\"wordCount\":249,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Critical Security Controls\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\",\"url\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\",\"name\":\"Look in the Rear View Mirror - Security Ever After - vCISO\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-06-10T13:07:00+00:00\",\"dateModified\":\"2023-02-01T14:55:23+00:00\",\"description\":\"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization\",\"breadcrumb\":{\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityeverafter.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Look in the Rear View Mirror\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityeverafter.com\/#website\",\"url\":\"https:\/\/securityeverafter.com\/\",\"name\":\"Security Ever After - CISO\",\"description\":\"vCISO\",\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityeverafter.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securityeverafter.com\/#organization\",\"name\":\"Security Ever After\",\"url\":\"https:\/\/securityeverafter.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"width\":1169,\"height\":826,\"caption\":\"Security Ever After\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/russelleubanks\",\"https:\/\/www.linkedin.com\/in\/russelleubanks\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\",\"name\":\"Russell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"caption\":\"Russell\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Look in the Rear View Mirror - Security Ever After - vCISO","description":"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/","og_locale":"en_US","og_type":"article","og_title":"Look in the Rear View Mirror - Security Ever After - vCISO","og_description":"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization","og_url":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/","og_site_name":"Security Ever After - vCISO","article_published_time":"2017-06-10T13:07:00+00:00","article_modified_time":"2023-02-01T14:55:23+00:00","author":"Russell","twitter_card":"summary_large_image","twitter_creator":"@russelleubanks","twitter_site":"@russelleubanks","twitter_misc":{"Written by":"Russell","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#article","isPartOf":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/"},"author":{"name":"Russell","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3"},"headline":"Look in the Rear View Mirror","datePublished":"2017-06-10T13:07:00+00:00","dateModified":"2023-02-01T14:55:23+00:00","mainEntityOfPage":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/"},"wordCount":249,"commentCount":1,"publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"image":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage"},"thumbnailUrl":"","articleSection":["Critical Security Controls"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/","url":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/","name":"Look in the Rear View Mirror - Security Ever After - vCISO","isPartOf":{"@id":"https:\/\/securityeverafter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage"},"image":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-06-10T13:07:00+00:00","dateModified":"2023-02-01T14:55:23+00:00","description":"An intentional look in the rear view mirror can help detect deferred maintenance and locate unnecessary risks imposed on your organization","breadcrumb":{"@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/securityeverafter.com\/look-in-the-rear-view-mirror\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityeverafter.com\/"},{"@type":"ListItem","position":2,"name":"Look in the Rear View Mirror"}]},{"@type":"WebSite","@id":"https:\/\/securityeverafter.com\/#website","url":"https:\/\/securityeverafter.com\/","name":"Security Ever After - CISO","description":"vCISO","publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityeverafter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/securityeverafter.com\/#organization","name":"Security Ever After","url":"https:\/\/securityeverafter.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","contentUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","width":1169,"height":826,"caption":"Security Ever After"},"image":{"@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/russelleubanks","https:\/\/www.linkedin.com\/in\/russelleubanks\/"]},{"@type":"Person","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3","name":"Russell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","caption":"Russell"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/250"}],"collection":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":5,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"predecessor-version":[{"id":1689,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/250\/revisions\/1689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}