Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

The Most Important Security Resolutions You Need to Achieve in 2016

2016 is here, which means you have a clean slate to adopt and deploy new security strategies that will turn things around for your organization. OK, maybe not exactly a clean slate - but at least a chance to make good on previous transgressions.

Spoiler alert: There are no secrets when it comes to implementing sound data protection. Generally speaking, everything you should be doing to protect your organization from both external and internal threats is something you probably already know. No need to reinvent the wheel. The key, however, is committing to applying - and sticking - to the core intentions.

The good news is they can work for any size organization. Of course, depending on the security-maturity level of your company, not every suggested technology solution will be right for you, but this list of four essential "resolutions" provides you a basic framework from which you can the shed the block-and-tackle, check-off-the-box mindset - and move toward a more risk-based focus.


With the available attack surface for criminals increasing by the day - given the rise of remote workers, and technologies like cloud, virtualization, mobile and the Internet of Things - businesses that address vulnerabilities before the bad guys do will find themselves light years ahead of the pack.

Suggested solutions: Vulnerability scanning, penetration testing, risk assessments, gap analyses


The best outcome if you are under attack is that the adversaries will be turned away thanks to a defense-in-depth strategy. The good news is that both rudimentary and sophisticated attacks can be halted at the source if you have the right package of integrated defenses in place.

Suggested solutions: Firewalls, anti-malware gateways, email security gateways, web application firewalls, unified threat management, mobile security, whitelisting


The reality, however, is that skilled hackers have a knack of successfully infiltrating their targets. And when they do, organizations are very poor at actually figuring out they've been compromised. According to the 2015 Trustwave Global Security Report, which examined hundreds of data loss investigations, 81 percent of businesses failed to detect a breach themselves. In case of a breach, organizations need to know as early as possible to limit damage and losses.

Suggested solutions: Threat management, SIEMs, intrusion detection systems


Incidents will happen. The Identity Theft Resource Center tabulated 781 identified breaches in 2015, compromising more than 169 million records. When a company experiences a breach, you'll want to respond in a meticulous and efficient manner specific to the type of intrusion occurring to determine the source, cause and extent.

Suggested solutions: Incident readiness and response


Security leaders require confidence. They are less willing to gamble on one-off products and desire more integrated, comprehensive and proven solutions that can win points both in the board room and the server room. And when they can't manage them themselves - due to a lack of in-house resources such as expertise and budget - they require help from a partner they can trust with the proven intelligence and expertise to not only build the solutions, but also run them.

Here's to a triumphant 2016!

 Dan Kaplan is manager of online content at Trustwave and a former IT security reporter and editor