• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

CEOs and CIOs: How to Use Military Strategies to Help Ward Off Cyber Security Threats

Most of the time, cybersecurity failures aren't technical failures. They're leadership failures.

November 11, 2015 TechDecisions Staff Leave a Comment

Consider these facts:

  • Ninety-five percent of security breaches are caused by human error.
  • Forty-two percent of those human-error-caused breaches are the result of the end user failing to follow policies and procedures.
  • Twenty-six percent of breaches are the result of the IT staff’s failure to follow policies and procedures.
  • Only 25 percent of company directors are actively involved in reviewing security and privacy risks.

No matter what type of business you are running, whatever the size, whatever the industry, cybersecurity failures can be catastrophic. They can damage your reputation, lead to high levels of employee dissatisfaction and morale issues, and legal problems resulting in often huge fines.

Fortunately, there are examples out there of how to successfully ward off security threats—and one of the best examples is actually the U.S. military. According to a recent article in the Harvard Business Review, “Cybersecurity’s Human Factor: Lessons from the Pentagon, “From September 2014 to June 2015 alone, [the U.S. military] repelled more than 30 million known malicious attacks at the boundaries of its networks.”

It turns out we can all take a page or two from the military’s success at staving off cybersecurity attacks. Here’s how:

Eliminate “sins of commission.”

Take a lesson from the U.S. military’s operation of naval submarines. Running an underwater nuclear submarine requires that every person be performing at the top of their game at all times. Sins of commission, or deliberate variations from protocol, can’t happen. Mistakes are chances to address and correct errors, but intentionally breaking from standards should not be tolerated.

Likewise, your organization needs to treat security with military-grade seriousness, and everyone on your team must understand that absolute integrity when it comes to security guidelines and protocols is of the utmost importance.

Build in monitoring and drills.


Advanced AV is an InfoComm CAVSP Diamond Certified firm made up of dedicated personnel who take great care in delivering results for clients. Headquartered in West Chester, Pennsylvania, Advanced AV has evolved with the advancement of technology into a specialized integrator of professional audiovisual systems for business, education, government, and worship facilities, serving the mid-Atlantic region of the U.S. Advanced AV and its sister companies, Advanced Staging Productions rental and MC3 creative services.

 

According to the authors of the HBR article, “In the nuclear navy, operators are rigorously trained before they ever put their hands on a real propulsion plant and are closely supervised until they’re proficient. Thereafter, they undergo periodic monitoring, hundreds of hours of additional training, and drills and testing.”

Leadership at your company should be responsible for ongoing monitoring. That means your systems themselves need to be audited, but these audits should also include the people who use your systems. How is the cybersecurity training at all levels of your organization?

And remember, while your IT team should absolutely be undergoing ongoing cybersecurity training, don’t forget, any person who uses your system could leave you vulnerable. Every single point of contact should be considered, and every staff member from the production floor to the C-suite, should be included in security training.

Encourage a questioning attitude in your culture.

This may sound surprising, because everyone knows chain of command is important in the military, but the reality when it comes to security is that everyone at every level is encouraged to ask questions. “Does this system make sense?” “Is this report indicating something that could be a problem?”

People in your organization need to know that they should listen to their own internal alarm bells, and they should be praised when they raise red flags. Additionally, everyone should be encouraged to double and triple check that procedures are followed.

When CEOs and CIOs Are Part of the Problem

The costs of failing to create a culture vigilant against cybersecurity threats can be huge. A 2014 study by the Ponemon Institute found that annually, the average cost of cybercrime suffered by a sampling of companies in the U.S. was $12.7 million. Even in industries without the resources to suffer such losses, consider the time lost resolving issues.

Surveys have found that C-suite leaders—including CEOs and CIOs—have a tendency to rate concern about cybersecurity lower than their managers outside of the C-site do. That’s a leadership problem. But fortunately, it’s not insurmountable, and with active participation in security initiatives, and a clear understanding of the potential for problems, it’s a leadership problem that can be fixed.

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Antivirus, Corporate, Malware Protection, Policy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.