The Invisible Achilles’ Heel of Network Security

Rie Vainstein • January 10, 2019

The Invisible Achilles’ Heel of Network Security

Not too long ago, we tweeted an article about the biggest hacks of 2018 and  yet another has just been revealed. This is becoming commonplace. The trend seems to be indicating that too many people have become complacent in their security protection. Hacking of any company’s data is BIG business – more so than most people realize.

According to CSO Online  about 58 records are stolen EVERY SECOND! Even though smaller breaches go unreported, larger ones are usually reported and, at an estimated average cost of $141 per record, the bill for a breach can be staggering.

Sticking your corporate head in the sand and saying “It won’t happen to me” is a big mistake. It is far better to put resources in place to ensure you have done everything you can, to defend yourself. Unfortunately, firewalls, anti-virus, anti-malware, strong passwords, biometric devices, and physical security measures are not always good enough. As a business manager (or owner) you also need to train your IT staff in what to look for that may indicate a threat, what to do during an attack, and how to mitigate potential future intrusions… BUT there is another layer of weakness that is often overlooked…

You may remember the story, from Greek mythology, of Achilles. He was the baby who, it was foretold, would die young. His mother took him to the river Styx, and dipped him in, holding him by the heel, in the hope that the magical water would give him the power of invincibility. Into adulthood, he survived many battles however, one day, a poisonous arrow was shot at him and hit him in the (un-dipped) heel. He died soon afterwards.

Forbes  revealed that, even after you have spent money on putting a strong security protocol in place to protect your company, and trained your IT team, your other (non-IT) employees can cause your company’s security downfall. Any employees who fail to follow simple security-oriented steps (either accidentally or deliberately) can cause gaping holes in otherwise competent network security.

It doesn’t matter how big or small your company is, employees can still be the cause of major weaknesses in your network security. Even if you think that training them is going to be more than the current budget can handle, that price, whatever it may be, is still going to calculate out as being significantly less than the cost of mitigating the devastating result of a full-scale breach.

Some of the old phrases or “sayings”, that we all heard our Grannies tell us, containing their sage wisdom, have never been more appropriate: “a stitch in time, saves nine” advises us that it is better to make your employees aware of the basics BEFORE they let you down, and potentially cost you a fortune, than leaving it until it is too late, and then being forced to “close the barn door after the horse has bolted”!

Training ALL your employees < not just your IT team > in network security is essential, because your company may already possess its invisible “Achilles’ heel”.

NC-Expert has been aware of this problem for a long time and offers training classes in network security – both for IT professionals AND for non-technical employees.

Contact us TODAY to discuss how we can help your employees prevent disaster!

===
Non-Technical Security Training:

  • CertNexus’ CyberSAFE
  • also NC-Expert exclusive training (contact us for details)

===
Professional Network Security:

===
If you would like to learn more about how NC-Expert can help,  contact us TODAY  !

NC-Expert Blog

By Rie Vainstein February 13, 2025
Critical Component for Your Future In today’s ever-evolving tech landscape, staying ahead of the curve is crucial. IT certifications not only validate your expertise but also help open the doors to better career opportunities and advancement. Whether you’re just getting started, or looking to advance, certifications from industry leaders like Ubiquiti , CWNP , CompTIA , and Cisco can be game-changers for your career. Why IT Certifications Matter IT certifications are a proven way to prove your skills and knowledge to employers. As businesses increasingly rely on technology for daily operations, they need professionals who can navigate the complexities of IT infrastructure, networks, and security. A certification can give you a competitive edge, help you land higher-paying roles, and keep you on the cutting edge of the tech industry.
By Phil Morgan February 11, 2025
The Grim Realities of Transition Mode Summary of a recent experience relating to Transition Mode. I have been quite vocal of my hatred of Transition Mode (for WPA3). We have a solution for this - dual SSIDs: https://wifisecuritywizard.com/general/problems-with-wpa3/ IMHO - Transition Mode is dumb! Turn on WPA3, and for everything that doesn’t support it, create a second SSID for now... while you upgrade everything! I have actually said “it’s 2025 for goodness sake, how many devices do you have that don’t do WPA3?!” Well, the other day, the universe decided to mess with me... Scenario: in one of our smaller offices, we are upgrading to Ubiquiti. I arrive on site, I upgrade the system, 5GHz only WPA3, everything is working great! I do one last check, and one of the users mentions, “Oh, the Brother color laser printer isn’t working.” (It’s a nice little device. Prints really well. Cheap to run.)
By Phil Morgan January 24, 2025
This blog is a write up of what was discussed at our AMA webinar session. (Link provided inline.)
Share by: