{"id":4107,"date":"2017-01-09T10:00:50","date_gmt":"2017-01-09T10:00:50","guid":{"rendered":"https:\/\/itsc-tx.com\/?p=4107"},"modified":"2022-11-01T06:58:24","modified_gmt":"2022-11-01T06:58:24","slug":"why-network-security-spending-is-not-enough","status":"publish","type":"post","link":"https:\/\/www.itsc-tx.com\/es\/why-network-security-spending-is-not-enough\/","title":{"rendered":"Why network security spending is not enough"},"content":{"rendered":"<h2>Why network security spending is not enough<\/h2>\n<p>Gartner puts worldwide spending on information security products and services in 2016 at $81.6 billion. That\u2019s about $5 billion more than the year before, yet no one is under any illusions that breaches are on the decline.why-security-spending-is-not-enough-banner.png<\/p>\n<p>That\u2019s because spending isn\u2019t enough. You need to be building on a bedrock of best practices to get results. ITIL (formerly the Information Technology Infrastructure Library), for instance, is an excellent place for healthcare IT departments to start. It is, however, just one collection of best practices.<\/p>\n<h3>1. Stick to secure configurations<\/h3>\n<p>Fundamental to maintaining system integrity, you should be starting from a well-known and secure configuration. Whatever the demands and pressures of the business to implement change quickly, it should only be to another well-known and secure configuration. It\u2019s important that the integrity of a configuration be maintained during any change process.<\/p>\n<h3>2. Which best practices to follow<\/h3>\n<p>ITIL defines three closed-loop processes that healthcare IT departments can use as foundational controls. They drive availability but have additional benefits in terms of uptime and a solid security footing.<\/p>\n<p>The processes in question are:<\/p>\n<p>Configuration management<br \/>\nChange management<br \/>\nRelease management<br \/>\nFollowing these processes closely means knowing your servers are secure and validated with a working configuration. When you have those things, you have a strong incentive to be rigorous when considering (let alone applying) changes like patches, adding new software, or changing hardware.<\/p>\n<p>Managing change well is absolutely fundamental to an organization\u2019s security. The best security policies, procedures, and technologies can be undermined the instant change management goes wrong.<\/p>\n<p>Again, ITIL is not the only choice when looking for a best practice guide. But if you are not following a recognized guide of some stripe\u2014whether it\u2019s ITIL, COBIT, or another\u2014alarm bells should be ringing.<\/p>\n<h3>The role of IT<\/h3>\n<p>Presently, doctors might separate out behavioural health\u2014such as forming better habits to stay healthy longer\u2014from other medical health issues when delivering care. But the smart use of data offers an opportunity to fix that artificial separation. One golden opportunity for IT is to explore technology that integrates various aspects of healthcare, which would save time and money as well as improve health outcomes.<\/p>\n<p>This is just one example of the sort of area where enterprise IT can do what it does best: getting to the root of the problem and designing technology to fix it, not just implementing technology because it\u2019s \u201csexy\u201d.<\/p>\n<h3>3. A change in philosophy<\/h3>\n<p>When you\u2019re too focused on point-based technology solutions and not focused enough on following best practices, you can expect to be breached.<\/p>\n<p>A philosophy that gives priority to core control processes will lead to a higher availability rate and fewer breaches. That\u2019s something that is easier to achieve when you don\u2019t see security as a feature that is bolted onto an existing IT framework or system. Bolting on security can\u2019t help you if your underlying environment is insecure.<\/p>\n<h3>4. Balancing the budget<\/h3>\n<p>Look to balance your spending appropriately between impressive new threat intelligence tools and the fundamentals of employing and maintaining controls. If your IT control process is broken, it\u2019s probably a good indicator your security is broken, too.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why network security spending is not enough Gartner puts worldwide spending on information security products and services in 2016 at $81.6 billion. That\u2019s about $5 billion more than the year before, yet no one is under any illusions that breaches are on the decline.why-security-spending-is-not-enough-banner.png That\u2019s because spending isn\u2019t enough. You need to be building on [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17043,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,30,31,38,34],"tags":[],"class_list":["post-4107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-budget","category-healthcare-it","category-it-security","category-technical-consulting"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"es","enabled_languages":["en","es"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false}}},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why network security spending is not enough - iTSC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why network security spending is not enough - iTSC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/\" \/>\n<meta property=\"og:site_name\" content=\"iTSC\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-09T10:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T06:58:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"795\" \/>\n\t<meta property=\"og:image:height\" content=\"313\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michelle Richard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Richard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/\"},\"author\":{\"name\":\"Michelle Richard\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"headline\":\"Why network security spending is not enough\",\"datePublished\":\"2017-01-09T10:00:50+00:00\",\"dateModified\":\"2022-11-01T06:58:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/\"},\"wordCount\":547,\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/why-security-spending-is-not-enough-banner.png\",\"articleSection\":[\"All\",\"Budget\",\"Healthcare IT\",\"IT Security\",\"Technical Consulting\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/\",\"name\":\"Why network security spending is not enough - iTSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/why-security-spending-is-not-enough-banner.png\",\"datePublished\":\"2017-01-09T10:00:50+00:00\",\"dateModified\":\"2022-11-01T06:58:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/why-security-spending-is-not-enough-banner.png\",\"contentUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/why-security-spending-is-not-enough-banner.png\",\"width\":795,\"height\":313},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/why-network-security-spending-is-not-enough\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itsc-tx.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why network security spending is not enough\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/\",\"name\":\"iTSC\",\"description\":\"IT Support #PeaceofMind\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itsc-tx.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\",\"name\":\"Michelle Richard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"caption\":\"Michelle Richard\"},\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/author\\\/mrichard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why network security spending is not enough - iTSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/","og_locale":"es_ES","og_type":"article","og_title":"Why network security spending is not enough - iTSC","og_url":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/","og_site_name":"iTSC","article_published_time":"2017-01-09T10:00:50+00:00","article_modified_time":"2022-11-01T06:58:24+00:00","og_image":[{"width":795,"height":313,"url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png","type":"image\/png"}],"author":"Michelle Richard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michelle Richard","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#article","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/"},"author":{"name":"Michelle Richard","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"headline":"Why network security spending is not enough","datePublished":"2017-01-09T10:00:50+00:00","dateModified":"2022-11-01T06:58:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/"},"wordCount":547,"image":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png","articleSection":["All","Budget","Healthcare IT","IT Security","Technical Consulting"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/","url":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/","name":"Why network security spending is not enough - iTSC","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#primaryimage"},"image":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png","datePublished":"2017-01-09T10:00:50+00:00","dateModified":"2022-11-01T06:58:24+00:00","author":{"@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"breadcrumb":{"@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#primaryimage","url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png","contentUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/01\/why-security-spending-is-not-enough-banner.png","width":795,"height":313},{"@type":"BreadcrumbList","@id":"https:\/\/www.itsc-tx.com\/why-network-security-spending-is-not-enough\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itsc-tx.com\/"},{"@type":"ListItem","position":2,"name":"Why network security spending is not enough"}]},{"@type":"WebSite","@id":"https:\/\/www.itsc-tx.com\/#website","url":"https:\/\/www.itsc-tx.com\/","name":"iTSC","description":"IT Support #PeaceofMind","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itsc-tx.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Person","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc","name":"Michelle Richard","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","caption":"Michelle Richard"},"url":"https:\/\/www.itsc-tx.com\/es\/author\/mrichard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/comments?post=4107"}],"version-history":[{"count":2,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4107\/revisions"}],"predecessor-version":[{"id":17044,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4107\/revisions\/17044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media\/17043"}],"wp:attachment":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media?parent=4107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/categories?post=4107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/tags?post=4107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}