A few weeks ago, I attended a blind dinner.
A full menu – served in complete darkness.

Everything was there: food, drinks, cutlery, service.
Just not visible.

Suddenly, completely new questions arose:
How do I drink without knocking the glass over?
How do I eat without spilling dinner on my shirt?

It was an exciting experience and a very clear feeling of uncertainty and loss of control.

This is exactly how many companies work when it comes to information security.
They operate information and IT security without a real overview of their sensitive data and information (“assets”). The tools are available.

But:
→ It is unclear what really needs to be protected.
→ Protection requirements are not clearly defined.
→ Access rights are not transparent.
The result: constant flying blind.

That’s why we turn on the light first.
When we at TEN Information Management GmbH start working with a customer, we first remove the blindfold:

▶︎ What data and information is available?
▶︎ What protection requirements exist?
▶︎ Who has access and why?

Only then can measures be prioritized, risks assessed, and economically sound decisions made—including when selecting security tools.

Those who think about information security exclusively from a tool perspective quickly lose sight of the essentials. This often has expensive consequences.

How do you ensure that information security is not operated blindly in your organizations?

P.S.
For anyone who wants to finally see what is really happening, especially in their network infrastructure:

Our new Open XDR (Extended Detection & Response) solution from AEGYS DATALYTICS provides real-time visibility – plug-and-play, intuitive, and priced to suit small and medium-sized businesses.

If you are interested, please book an appointment.

Tags

Share post

More articles

A serious vulnerability exists in the popular Samba server, which provides Windows file and print services in Linux environments. Linux systems should be updated as soon as possible, because the vulnerability with the identifier CVE-2020-27840...
ISO 27001 – Management of technical vulnerabilities The newly published ISO 27001:2022 in October 2022 brings a restructured catalogue of measures. Among other things, the new measure A.8.8 – Management of technical vulnerabilities – was...
Recently at an NIS 2 workshop with a client’s management team.Topic: Reporting requirements for IT security incidents. The central BSI portal for reporting security incidents has recently been launched – which is good and right....