In anticipation of October’s Cybersecurity Awareness Month, I thought it would be important to get ready by digging into the key differences between IT and Cybersecurity – because we often find there are gaps when we talk to people about their strategies.
I’ve had over a decade worth of experience working with Cybersecurity, IT, and closely related technology providers. And, over that time, it’s been pretty common to see businesses scratching their heads at exactly where the line between responsibilities exist.
It’s not really anyone’s fault, it’s a very blurry line. Sometimes it’s from confusion in marketing and use of buzz words, but it can also be hard to keep track of all of the unique approaches a vendor may offer.
It really matters though, because gaps can be a serious problem and a blind spot that leaves you exposed to threats.
This most recently came up, and inspired this article, because an office I’ve been sharing free resources with for a few months reached out with a hard lesson they learned that’s worth sharing:
I think about this a lot and I’ve seen this situation quite often really, where it’s assumed IT has it covered – but they don’t!
And, I’ve seen it the other way around, where IT has been very vocal that more is needed to be done but the client either isn’t getting it or just doesn’t want to do anything.
So with that in mind, I wanted to help lay out what some of the differences are that you need to look for and be aware of, and give you some things to look into to make sure you’re on the right track.
Let’s start with looking at the core missions behind each practice:
Of course, this is highly generalized, but a great example of how this can play out is when you look at how each group might approach a ransomware attack.
I don’t hear about this happening as much but I ran into several issues in the past where we hit a dead end with a breach investigation because the IT team didn’t realize they destroyed the evidence we needed.
All this being said, some organizations now combine IT and Cybersecurity services to make sure they can cover all of the related missions necessary to manage and protect your business.
But that also brings me to the next area to look at…
The structure that I’ve seen be the most successful is working with 3rd party providers where the IT or Managed Services Provider (MSP) tends to act similar to your general physician. And, where specialists may be needed to provide niche expertise or a second opinion.
That isn’t to say it’s impossible to do both under one vendor, but sometimes that other opinion is really important.
I once went into the ER and was told I had a fractured elbow and was sent to get a second opinion from an orthopedic practice. When the MRI came back, it showed a torn bicep. Probably something really obvious to that specialist but a bit of a big miss for the ER doc.
It’s why they have a referral process to get that other opinion.
And, it’s something to keep in mind when you have IT and Cybersecurity combined under one provider.
Even beyond biases, it can be easy to overlook something or make a mistake. Having an unbiased 3rd party act as quality assurance and bring a unique perspective with their expertise can help you avoid these types of blind spots.
There are a few areas that you may find Cybersecurity gets well away from the technical side of things and more into operations and legal matters.
On the operations side of things, your Cybersecurity provider is going to need to know more about how your technology is used than just the technology itself. To understand and address your risk, it takes a deeper dive into the types of data you interact with, the processes around it, and may involve other software not managed by the IT provider.
For the legal side of things, there are requirements around data security, data disposal, data privacy, breach notification, and even those set by 3rd party partners or insurance. Different levels of experience in these areas are going to be needed depending on where you fall here.
One of the biggest areas of confusion I see today happens to come about with common marketing terms that get thrown around.
For an IT provider, you have to be offering ‘cybersecurity’ or your competitors will eat your lunch.
Depending on the vendor, providing ‘cybersecurity’ could mean just offering products like Antivirus/Endpoint Detection and Response (AV/EDR) or Security Operations Center (SOC), and be light on the consulting and guidance around risk mitigation and more proactive strategies.
It’s great if you have a selection of tools to use, but what good is it if the strategy around those tools is missing?
One other area of confusion comes up in the type of ‘monitoring’ being provided.
When vaguely defined, it can be dangerous to assume that ‘everything’ is being monitored.
Make sure that, if your IT team includes ‘monitoring’, that it goes beyond just performance and network monitoring to also provide monitoring around threats and vulnerabilities.
You may need to supplement this with help from a Cybersecurity provider that has experience with vulnerability scanning and other tools that can both identify risks as well as possible misconfigurations or other mistakes that can easily happen.
Even writing this article is tricky because there’s no set line between IT and Cybersecurity and, as we’ve shared here, it really depends on the providers you have and their experience and offerings.
If you want to make sure you have the right approach in place, there are a few things you can ask about that are Cybersecurity practices all businesses should have in place.
These are the most common areas where I find blind spots in my consultations:
Risk Assessments and Understanding RiskIn the end, everyone is unique, it all comes down to looking more closely at your practices and what your providers offer.
To help people sort through it all, I offer free consultations where we can take a look at your practices and help you identify any major gaps in your approach (or confirm when you’re on the right path already!)
You can set up your free consultation with me here.
If you want help and would like to keep learning, don’t miss our major event for Cybersecurity Awareness Month happening all throughout October.
We have free cyber resources, free phishing simulations, a free Cybersecurity Awareness Month Kit to help you run your own event, and we’re including 19 different live events to help you make some progress on your risks and with your staff.
Check it out here: https://rlsconsulting.co/october/