Should you ever DIY cyber security?

When it comes to cyber security a have-a-go attitude can lead to more than just a burst pipe

What’s in your cyber security toolkit?

I’m pretty darn good at DIY, even if I say so myself. I think my ginormous IKEA PAX wardrobe stands testament to that, along with my immaculately glossed front door and wonderfully tiled kitchen. But there are some things I won’t touch, for example after trying to take a radiator off a wall and ending up with water pouring out the pipework I’ve crossed plumbing off the list, and I’ve always left electrical work to the experts (hi Dad!).

Personally I think the DIY, have-a-go mentality of the British is something to be proud of. 60% of us will tackle a project every spring and together we support an industry estimated to be worth £8.3bn in 2017.

But, as I am only too aware post “radiator-gate”, sometimes this attitude can cost us more than it saves. It’s reassuring to know I’m not alone in botching up the odd project, current estimates reckon professionals have to put right about 3.3 million DIY disasters every year.

But while this may be costing the average homeowner around £3,000 a year (that’s a LOT of radiators) when corporate DIY projects go wrong the costs are on another level.

In fact if you read some of the horror stories on International Project Leadership Academy’s website you’ll see that the DIY mentality has spread to the corporate world. In fact in the “Common mistakes” section their number 1 item is “The underestimation of complexity, cost and/or schedule”.

So while some organisations may have the luxury of taking their time to find and hire people with the right knowledge so they have the expertise in-house, for the majority of companies often headcount and budgetary restrictions just don’t allow it. And it’s ultimately costing them more.

DMARC & DIY

I see perfect examples of our proud DIY heritage on an almost daily basis when I talk to organizations looking to implement DMARC. I’ll often hear “it’s an open standard, why do I need you to implement it?” It’s a fair question, and I understand why people ask it so I’ll share with you what I tell them (lets see how far I can stretch the DIY analogy… ready?)

“You are absolutely entitled to try and implement DMARC (install a new hallway light) yourself but what you’ll quickly find is the dense DMARC XML reports (two-way switching wiring) hard to interpret and without a specialist on the team (hello again Dad) who has time to dedicate to the project it can quickly get pushed back or abandoned.

This is borne out in recent a survey* of the top 2 million public websites of the mere 3.4% who had started a DMARC project, two thirds never made it to quarantine or reject.

Not only is that a lot of companies who aren’t even starting their DMARC journey, that’s nearly 35,000 organisations who are losing their way due to a combination of not enough time, resources or expertise.

So all DIY similes aside, what buying a product from a DMARC expert really gives you isn’t just something which is free anyway, but access to tools and specialists who will help you to not only get to p=quarantine or reject more quickly, but stay there.

Look before you leap

My advice? Before you embark on your next DIY project do your research and be honest about your skills and what time you have available to tackle the task. Otherwise you’ll end up not only wasting time and money trying to achieve the impossible, but you could make things worse through misconfiguration.

Something like our buyer’s guide will give you all of the insight you need to make that judgement call so you can call the experts in to begin with, and not be stuck sitting in the hallway emptying a rapidly filling bucket waiting for the plumbers to arrive (yes I’m talking about the radiator again!).

*Conducted by Red Sift in October 2017

PUBLISHED BY

Clare Holmes

28 Nov. 2017

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Cybersecurity

Strengthening U.S. political campaigns against cyber threats: The urgent need for DMARC…

Sean Costigan

Securing political campaigns from cyber threats has never been more urgent. It is critical to secure communications that handle sensitive exchanges with voters, contributors, donations and coordinate complex operations. Campaigns make exceptionally rich targets for cyber espionage and exploitation, with our open-source research, demonstrating nearly 75% of US Senate campaign websites having not achieved…

Read more
Certificates

Apple & Chrome propose reduced certificate lifetime

Jack Lilley

The lifetime of SSL/ TLS certificates continues to grow shorter. Chrome initially proposed reducing certificate lifespans to 90 days to enhance security and mitigate risks associated with compromised certificates. Apple took this initiative further, proposing a draft ballot to shorten the maximum validity period for public SSL/TLS certificates to just 45 days by 2027.…

Read more
AI

Skill up your security: How defenders can harness AI

Jack Lilley

How can defenders identify and resolve security issues faster with Red Sift Radar, and what does it have to do with the movie Tenet? That was the key theme of this year’s 16th e-Crimes & Cybersecurity Mid-Year Summit education session, featuring Billy McDiarmid. If you missed the event, don’t worry—we’ve got you covered with…

Read more
Cybersecurity

Behind the Screens: North Korea’s Focus on DMARC in Email Espionage

Sean Costigan

If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered.  Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North…

Read more