A few weeks ago, I attended a blind dinner.
A full menu – served in complete darkness.

Everything was there: food, drinks, cutlery, service.
Just not visible.

Suddenly, completely new questions arose:
How do I drink without knocking the glass over?
How do I eat without spilling dinner on my shirt?

It was an exciting experience and a very clear feeling of uncertainty and loss of control.

This is exactly how many companies work when it comes to information security.
They operate information and IT security without a real overview of their sensitive data and information (“assets”). The tools are available.

But:
→ It is unclear what really needs to be protected.
→ Protection requirements are not clearly defined.
→ Access rights are not transparent.
The result: constant flying blind.

That’s why we turn on the light first.
When we at TEN Information Management GmbH start working with a customer, we first remove the blindfold:

▶︎ What data and information is available?
▶︎ What protection requirements exist?
▶︎ Who has access and why?

Only then can measures be prioritized, risks assessed, and economically sound decisions made—including when selecting security tools.

Those who think about information security exclusively from a tool perspective quickly lose sight of the essentials. This often has expensive consequences.

How do you ensure that information security is not operated blindly in your organizations?

P.S.
For anyone who wants to finally see what is really happening, especially in their network infrastructure:

Our new Open XDR (Extended Detection & Response) solution from AEGYS DATALYTICS provides real-time visibility – plug-and-play, intuitive, and priced to suit small and medium-sized businesses.

If you are interested, please book an appointment.

Tags

Share post

More articles

Cybersecurity experts from around the world gathered in Nashville, Tennessee from 25-27 October for this year’s ISC2 Secure Congress. It became clear that the information and IT security community cannot ignore the topic of Artificial...
Conversion to the latest version of the standard Companies that are certified according to the international standard ISO 27001 will have to think about converting their ISMS to the latest version of the standard in...
“The cloud is another name for “someone else’s computer,” and you need to understand how much or how little you trust that computer.” (Bruce Schneier). The quote comes from the context of the LastPass breach...