{"id":66099,"date":"2019-03-07T15:54:58","date_gmt":"2019-03-07T13:54:58","guid":{"rendered":"https:\/\/www.mywot.com\/blog\/?p=66099"},"modified":"2025-01-07T12:01:49","modified_gmt":"2025-01-07T10:01:49","slug":"risk-based-security","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/risk-based-security","title":{"rendered":"Is Risk-Based Security the Key to Driving Business Value in 2019?"},"content":{"rendered":"<h2><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-66100 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/800x475-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019.png\" alt=\"\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/800x475-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/800x475-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/800x475-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/h2>\n<h2>Cyber Security<\/h2>\n<p><span style=\"font-weight: 400;\">Cyber security can be a difficult task to manage. In a world where breaches have become a regular occurrence, how much security is actually needed within organisations? For many firms, the default setting is to have just enough security to get by &#8211; nothing too fancy or expensive or even anything that requires many hands on deck. This means that firms only invest in security when needed. Think ad hoc style, tackling new threats as and when they appear. <\/span><\/p>\n<p>However, in 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy in order to drive long term growth and reduce the risk of threats that have become more and more apparent in recent years. You can read more about the 5 New Internet Security Trends in the Workplace <a href=\"https:\/\/www.mywot.com\/blog\/5-new-internet-security-trends-workplace\">here<\/a>.<\/p>\n<p>Cloud and cellular platforms, DevOps based utility growth, IT and OT convergence and the Internet of Things are all part of the digital transformation that is redefining the principles of workforces around the world. That being said, as more and more knowledge goes online and organisations become more and more dependent on these methods to drive progress, they run into the dangers of IT disruption and cyber threats. Almost 43% of organisations in 2018 alone reported safety breaches or online assaults.<\/p>\n<h2>Responsibility<\/h2>\n<p>The daily influence of online threats and digital assaults are very real and in some cases can be very extreme. So, the question is, why aren\u2019t organisational leaders in favor of putting money into safety rather than reactively paying off a ransomware threat?<\/p>\n<p>It appears that this is partly due to an absence of management in various organisations. Along with that, there\u2019s confusion as to who is actually responsible for cyber security. Some believe it\u2019s down to the CIO, others the CEO and some have never had to deal with these threats hands on so don\u2019t see the point in investing in it ahead of time.<\/p>\n<p><span style=\"font-weight: 400;\">However, in these cases reactive safety can result in critical gaps in safety, and fail to assist the long-term strategic progress of an organisation. According to KPMG: \u201cThe question shouldn\u2019t be \u2018how much of my IT budget are we spending on cyber?\u2019. The question should be \u2018how much of my business change or innovation budget are we spending on cyber security?\u2019.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security requires a long-term, risk-centric method primarily based on finest practices together with multi-layered safety on the endpoint, community, cloud\/on-premises servers and electronic mail\/internet gateways. Security consciousness programmes are key to turning any workforce into a powerful first line of defence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To begin with, some organisations may want to look at basic security services that are available to them online. For example, <a href=\"https:\/\/www.mywot.com\/\">WoT<\/a> is a great platform to aid a safer browsing experience. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">A global community made up of over 140 million people help WoT know what websites are safe and which ones are not. WoT\u2019s data, ratings and reviews are powered by the people and is available to download on Android too, to make sure you stay safe on the go. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">WoT protects you while you browse the web, and instead of thinking is this website safe, you\u2019ll see a warning sign when you visit dangerous sites, scams, malware, phishing, rogue web stores, dangerous links, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These reputation icons are displayed next to search results, social media, email, and other popular sites to help you make informed decisions while online, with red indicating potential danger, yellow alerting you that the site has an \u2018average\u2019 rating and green letting you know the site you\u2019re browsing is safe. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">These website reputations are calculated by combining advanced algorithms along with millions of user reviews who make up the WoT community. Sounds like a start for your cyber security? You can download it <\/span><a href=\"https:\/\/www.mywot.com\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>Additionally, incident detection and response is one other essential element, enabling IT to get on the entrance foot to identify and block assaults earlier than they are able to influence an organisation, and use intelligence to proactively enhance cyber defences for the longer term &#8211; will no doubt secure any organisation ahead of any threats that may be very damaging to their existence.<\/p>\n<p><span style=\"font-weight: 400;\">With long term goals in mind and while organisations up their online security some may think of outsourcing the heavy load to third party individuals who are skilled in these areas. In order to drive proactive cyber safety, the assistance of a managed service provider who can carry this load may be necessary as we go into 2019.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Cyber security can be a difficult task to manage. In a world where breaches have become a regular occurrence, how much security is actually needed within organisations? For many firms, the default setting is to have just enough security to get by &#8211; nothing too fancy or expensive or even anything that requires [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":66101,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Risk-Based Security the Key to Driving Business Value? | WOT<\/title>\n<meta name=\"description\" content=\"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/risk-based-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Risk-Based Security the Key to Driving Business Value? | WOT\" \/>\n<meta property=\"og:description\" content=\"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/risk-based-security\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-07T13:54:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:01:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/thumbnail-400x400-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Is Risk-Based Security the Key to Driving Business Value in 2019?\",\"datePublished\":\"2019-03-07T13:54:58+00:00\",\"dateModified\":\"2025-01-07T10:01:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security\"},\"wordCount\":769,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Device Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/risk-based-security#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security\",\"url\":\"https:\/\/www.mywot.com\/blog\/risk-based-security\",\"name\":\"Is Risk-Based Security the Key to Driving Business Value? | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2019-03-07T13:54:58+00:00\",\"dateModified\":\"2025-01-07T10:01:49+00:00\",\"description\":\"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/risk-based-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/risk-based-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Risk-Based Security the Key to Driving Business Value in 2019?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Risk-Based Security the Key to Driving Business Value? | WOT","description":"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/risk-based-security","og_locale":"en_US","og_type":"article","og_title":"Is Risk-Based Security the Key to Driving Business Value? | WOT","og_description":"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy","og_url":"https:\/\/www.mywot.com\/blog\/risk-based-security","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2019-03-07T13:54:58+00:00","article_modified_time":"2025-01-07T10:01:49+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/03\/thumbnail-400x400-Is-Risk-Based-Security-the-Key-to-Driving-Business-Value-in-2019.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/risk-based-security#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/risk-based-security"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Is Risk-Based Security the Key to Driving Business Value in 2019?","datePublished":"2019-03-07T13:54:58+00:00","dateModified":"2025-01-07T10:01:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/risk-based-security"},"wordCount":769,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Device Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/risk-based-security#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/risk-based-security","url":"https:\/\/www.mywot.com\/blog\/risk-based-security","name":"Is Risk-Based Security the Key to Driving Business Value? | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2019-03-07T13:54:58+00:00","dateModified":"2025-01-07T10:01:49+00:00","description":"In 2019 organisations need to rethink this reactive and short-term approach to cyber security in favor of a more proactive risk-based strategy","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/risk-based-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/risk-based-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/risk-based-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Is Risk-Based Security the Key to Driving Business Value in 2019?"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66099"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=66099"}],"version-history":[{"count":5,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66099\/revisions"}],"predecessor-version":[{"id":68111,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66099\/revisions\/68111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/66101"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=66099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=66099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=66099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}