The Blind Spot In Your Cyber Strategy
Posted: Monday, Jun 30
The Blind Spot In Your Cyber Strategy cover

i 3 Table of Contents

The Blind Spot In Your Cyber Strategy

Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid the increasingly sophisticated threats.

Start With The Basics

A normal work day suddenly disrupted when cloud platforms become inaccessible, key systems go offline, and teams scramble to figure out what went wrong. This chaos is becoming the norm. Whether the cause is human error or a sophisticated cyberattack, the disruption looks the same on the surface. Too often, organisations are caught off guard, not because they aren’t smart, but because they’re unprepared for either scenario.

The hosts highlighted something that a lot of folks forgot to talk about… the basics. As Scott puts it, organisations are constantly playing catch up instead of building and strengthening their foundations. He explained that it doesn’t have to be placing the latest nor the smartest technology, but knowing the most mission critical systems and having tested continuity plans. These, according to him, are the most important.

Target Shifted: From Networks To People

The three also stressed how attackers changed their game. It’s no longer just about breaking into the system. Now, the easiest way is through people. From phishing emails, social engineering, and even deepfakes, employees who aren’t trained to spot these tactics are easy targets. This sends a clear message that security isn’t just for the IT teams. Everyone in the business needs to be part of the defence.

Less Human Access, Less Risks

Since people are often the easiest way in for attackers, James brought up a practical fix, which is to get fewer people involved in sensitive systems and instead use smart automation. By optimising this kind of technology, organisations get more consistency, better tracking, and fewer chances for someone to mess up by accident. Most importantly, organisations can detect early whether their assets have been compromised.

That said, the goal is not to replace people, but to support them. This technology works best when it’s combined with clear training and a strong culture of accountability.

Pamela Hornilla
Pamela Hornilla is a communications specialist with a degree in Development Communication. Currently pursuing her Juris Doctor degree, she explores the intersection between cybersecurity and public policy. She also focuses on translating complex cybersecurity issues into digestible and relatable content to empower readers into making sound cybersecurity decisions.
Share This