Insights: Article

What Fire Ants Teach Us About Cybersecurity

By   Anders Erickson

September 25, 2017

About the time that Hurricane Harvey was making landfall in southeast Texas, several news media outlets published articles about how fire ant colonies survive during floods. Fire ants have an exoskeleton that repels water. In a flood, fire ants survive by intertwining their legs and using their closely-connected bodies to create a fire ant raft. With this collective raft, fire ants can drift for miles until they find dry land. What fire ants instructively realize is that they need one another to survive.

Fire ants can teach us about cybersecurity. Many organizations fail to realize that every single user, no matter how great or small their contribution, has a role to play when it comes to cybersecurity. We all need another’s help to create an organizational culture where cybersecurity is seen as the critical element to success that it is. Leaders and executives need to recognize their role in fostering an environment where cybersecurity is not only taught, but respected. Where all users, regardless of responsibilities or access, are educated about their roles and responsibilities related to cybersecurity. Users need to recognize that their actions when they log onto a system can have a profound impact on the security of the organization and its data.

To help organizations foster a positive culture of cybersecurity, many regulatory bodies and industries groups have developed security frameworks. These frameworks are intended to ensure that organizations who implement these frameworks have considered all aspects of security. Below is a summary of some of these frameworks along with some of the industries that have adopted each:

  • NIST Cybersecurity Framework – Federal, State, & Local Government
  • ISO 27001 – Manufacturing & Construction
  • COBIT – Insurance
  • HITRUST – Health Care
  • FFIEC – Financial Institutions

Identify the framework that will best help your organization meet its security and compliance needs. Even with a chosen frameworks, many organizations struggle to find resources to aid in the implementation of sound security practices. Several excellent resources are available online. One such resource is a website called www.infosecstack.com. This site provides links to free online resources for a variety of cybersecurity topics—from antivirus to two-factor authentication. For the more technical users, the website www.sectools.org provides descriptions and ratings of the top 125 network security tools.

Remember: We’re all in this together. Just like fire ants, if we all recognize the importance of our individual roles and rely on one another to each do our part, we can weather any cyber storm.

Latest Insights

July 19, 2018
Article
While it’s great to watch your team grow, hiring new employees can be a frustrating and grueling process.
July 19, 2018
Article
Often, human resources (HR) is over looked, but we’re here to tell you it’s an essential component of any organization and critically important to get right.
July 13, 2018
Article
Here are some idea for giving your new hire a smooth start into your business and alleviating stress for you.
July 13, 2018
Article
The impact of the recent SCOTUS Wayfair decision will continue to have a ripple effect on businesses and state sales tax compliance.
July 9, 2018
Article
The revenue cycle is a complex system and we have historically given much attention to the front-end and back-end while oftentimes leaving the middle functions of the cycle neglected.
July 3, 2018
Article
FASB Accounting Standards Codification Topic 606, Revenue from Contracts with Customers, provides a 5-step framework for determining revenue recognition.
July 2, 2018
Article
As part of the Tax Reform Act of 1986, the “Kiddie tax,” a taxing regime designed to make the transfer of income items by wealthy parents to lower tax paying children less attractive, was implemented.
July 2, 2018
Article
When it comes to your employees, you likely conducted interviews on them when you first hired them.
July 2, 2018
Article
Nearly ten years after the release of the initial exposure draft, FASB issued ASU 2016-02, Leases - The standard may have been issued, but the conversation about this re-write of legacy guidance has not slowed.