What Daredevil season 2 teaches IT professionals about security

23 June 2016

3 min read

Daredevil’s world is viciously corrupt. Criminals lurk behind every dark corner in a burning and lawless Hell’s Kitchen. Morality is thin here, and even Daredevil himself queries it from time to time. The world in which Daredevil fights is not unlike the environment of security today. Data-driven networks are vast and complicated, and every gap in architecture can be an invitation for a breach or hack.

What Daredevil season 2 teaches IT professionals about security (Desktop)

Just as Matt Murdock has had to overcome seemingly impossible circumstances in order to fight justice as his alter ego Daredevil, so IT professionals have to face an increasingly insurmountable security landscape. Here are three themes in Netflix’s ‘Daredevil Season 2’ that apply to how IT professionals can prepare an always-on defence to today’s biggest threats.

A heightened sense of awareness is key

Murdock’s blindness becomes his strength and eventually, through training, Daredevil’s power. Daredevil’s other senses are increasingly enhanced through his loss of sight, and so he becomes more aware of his surroundings.

Heightening awareness in today’s lax security data environments is essential. A devastating 56% of enterprise companies leave networked office printers out of their security strategy1 even though in a survey conducted by the Ponemon Institute, 60% of companies reported having had a data breach involving printers, requiring an average of 46 days to resolve a cyberattack2. In another survey, 80% of companies indicated that IT security is important to business processes; but just 59% of those companies stated that print security was important to them3. Only by keenly being attuned to all vulnerabilities can a business truly become secure in today’s hacker environment. Networked printers pose incredible threats to businesses and must be thoughtfully considered in a comprehensive IT security strategy.

Morality can be blinding

By day, Murdock is a humble, unassuming lawyer, taking on underdog clients facing seemingly impossible odds. By night, he slays criminals as a vigilante hero, enacting the real justice that is left unfinished from his daily struggles in the corrupt court system. The moral conflict in Murdock is huge. Racked with guilt from the violence he caused the night before, Murdock spends many days confessing to his priest.

Morality can be blinding. Morality causes most people to think their co-workers can be trusted, but the sad truth is that not every employee can be trusted. Businesses must open their eyes to see that the most unsuspecting employees could be thieves. In a recent interview survey from IDC, an IT director at a manufacturing company explained that his organisation lost intellectual property as a result of, among other things, employees printing highly confidential and proprietary information and providing it to the company’s competitors. In that same survey, a different IT director at a financial services company explained that employees at his organisation were putting designs and other intellectual property at risk by printing indiscriminately or leaving printouts in the output tray. Without the right print authentication features, anybody could easily pick up printouts from the office printer, regardless of who sent the job.

The power struggle

When Murdock transforms into the crime-fighting Daredevil, he risks everything, even himself, to do the right thing. As technology has evolved and become more powerful, IT finds itself at the helm of a more complicated and compelling network of services and devices. Yet as networks have matured, so have the skill and agility through which hackers have brazenly carried out some of the most dangerous security breaches in history. Headlines about the latest breach are more frequent than ever. Research shows that 60% of IT managers think their printers are likely infected with malware. The responsibility of managing today’s office networks is immense and requires continual vigilance.

Defending your network

A more serious security environment calls for a more serious printer security strategy. Put up the right defence the first time by following these three steps:

  1. Engage a security consultant. Don’t be afraid to tap experts when there are gaps in your staff’s knowledge about certain issues. Printer security experts can help you create a strategy that works for you.

  2. Conduct an assessment. Is your company really at risk, and to what degree? Assess your current security measures to see if they’re up to scratch. Take this free survey to see where your weaknesses may lie.

  3. Develop a plan. Help secure your print fleet and schedule necessary appraisals and evaluations to keep that plan actionable as technology, and the hackers who want access to it, evolves.

Read more about HP’s secure printing options here: www.hp.com/go/PrintersThatProtect

Footnotes

“The Insecurity of Network-Connected Printers,” Ponemon Institute, October 2015.
Ibid.
“The Business Value of Printer Security,” IDC, November 2015.
“The Insecurity of Network-Connected Printers,” Ponemon Institute, October 2015.

Print