Decentralized Cybersecurity: Changing How We Think About IT
by Mikey Pruitt on Mar 1, 2022 12:00:00 AM
This blog post came about after repeated conversations, both with co-workers and customers of DNSFilter. I realized what we were talking about when we discussed the modern IT stack was really a decentralized cybersecurity program: A layered security architecture where an ecosystem of software would work together to protect and insulate your organization, specifically for endpoints.
The need for this is twofold:
- Legacy solve-for-everything solutions just don’t work in 2021
- A decentralized plan allows IT organizations to be agile, and for once embrace (or at the very least live with) the shadow IT that’s been feared for so long
We are not advocating for the death of IT departments. Instead, we want IT and cybersecurity to have a stake in the ground in every department.
Decentralized IT vs. Decentralized Cybersecurity
These are two different things, but you can’t have one without the other.
IT (and by extension, cybersecurity tools implemented by IT) is no longer separate from the rest of the business unit. Instead, it needs to be integrated.
Decentralized IT is all about giving IT a stake in the ground in every department. That means an IT liaison in marketing, sales, finance, DevOps, etc. These liaisons take on special projects, such as building the infrastructure for large data warehouses and maintaining those systems. They are specialists, not generalists.
Decentralized cybersecurity is a product of decentralized IT. Where decentralized IT is the act of integrating IT within the business to give each department an invitation to the IT table, decentralized cybersecurity is the act of protecting users where they are.
We are no longer protecting whole departments or an entire company at one level. We’re fashioning a security life preserver for each person (and endpoint). Everyone gets their own preserver instead of having large lifeboats on-deck ready to deploy.
It’s not just remote work that has led to the need for personalized cybersecurity. Each user in each department (not counting the IT liaisons) is a specialist in their own right. Your marketing team might use a few shared tools, but there will certainly be one person who uses hardware or software unique to them.
You might be screaming “That’s Shadow IT!” at this point, but that’s where I’ll argue that this is just the way we need to all start working in 2022.
The goal is to put a cybersecurity infrastructure in place that enables individuals and their departments to work with agility. They can adopt the software and tools they need without waiting for IT sign-off, because their cybersecurity is already taken care of regardless of what they choose to use. Granted, there should be policies in place that dictate how new tools are installed and security measures that should be used whenever available (such as multi-factor authentication).
The modern tech stack, zero trust policies, and endpoint-first thinking are the centurions standing watch over all paths.
Hybrid Work is the New Normal
We’ve all heard how the pandemic drove companies to rethink how they work. Most scrambled to find solutions to send employees home while maintaining the throughput expected at the office. With little time to plan for the mass exodus from the office the solutions were cobbled together haphazardly. Now is the time to take a step back and deal with the fallout because working remotely will continue. We may not see the levels of remote work we saw in March 2020. But as the new adage goes: “Work is where the laptop is”.
Shadow IT is not a Fad
I often read stories where IT battles against other departments bringing random SaaS apps into the organization like this epic reddit rant. Cloud offerings are easier to onboard, typically narrowly focused, and have their own support channels.
SaaS is a staple of the modern org and IT departments need to accommodate. Gartner forecasts end-user spending on public cloud services to reach $396 billion this year—and grow 21.7% to reach $482 billion in 2022 and the pandemic has only intensified the trend. The “check with IT first” sentiment is real, but it’s an outdated paradigm that needs to change. There are many problems with IT being the gatekeeper of all digital assets in an organization:
- Slows progress
- Creates and emphasizes animosity
- Disassociates department budgets
So how does IT keep the organization secure and retain flexibility?
- Harden the endpoint to shrink the attack surface
- Prevent attacks that cannot be eliminated by hardening
- Detect and respond to breaches
IT has evolved to the point where shadow IT is just a part of life. We can optimize our security processes to account for the inevitability of shadow IT.
Webinar Resource: Security happens wherever your end users are.
Watch our on-demand webinar with DNSFilter's Product Manager Mikey Pruitt as dives more into the topic of decentralized cybersecurity and covers the following topics:
- The current state of IT and the decentralized approach
- Major cyber attacks in 2021
- Rethinking shadow IT
- Perimeter Defense and Detection & Response
Sign up to access the Decentralized Cybersecurity Webinar here!
When researchers talk about DNS security, they often refer to anything that protects DNS infrastructure. Although protective DNS and DNS security fall under the cybersecurity umbrella, protective DNS takes a different approach to cybersecurity than standard DNS security. Both security strategies are important for the stability of your business, but protective DNS reduces risks from your weakest link–human error. Protective DNS is critical for you...
The impending Cisco Umbrella RC End-of-Life has many Umbrella users concerned about their next steps and questioning which protective DNS solution might be able to fill the gap for their organization.
Industry State of the Art
This month there was a high level of focus on compliance issues spanning several focus areas from governments and oversight agencies around the world. And while there were actions taken with regard to specific vulnerabilities, a larger spotlight was placed on bigger picture security considerations in a more general context.