It was announced over the weekend that the breach at the IRS was twice the size of the previous announcement. UC Berkeley announced a data breach of 80,000 faculty and students. Data breaches are the norm, not the exception. As we move to include more mobile devices and into the Internet of Things, our ability to set security standards and enforce them will become increasingly challenging. Many of the portals into our information systems will have little or no security associated with them – at least not in the conventional sense. Someone breaking into a light switch or a refrigerator may be able to penetrate an environment thought to be secure.

The remote and mobile devices that connect to one system may connect to multiple systems with varying degrees of security requirements.

Is it practical or wise to try to apply our existing security strategies in such an environment? Is it even possible to keep attackers out? Should we not devise and deploy a strategy that defeats the attacker after they penetrate the system instead of trying to keep them out? This is the security strategy employed by every biologic immune system and has been under development for over a billion years. It seems to be the best strategy and we can emulate it.

The On!iU™ approach does just that. We assume the attacker possesses the credentials to gain access and deal with the problem from that point of view.

Back to blog listing


© 2016 On!iUs Inc., 15250 Heather Mill Lane, Haymarket, Virginia 20169, USA. All Rights Reserved.