Under-prioritising Availability is not good for business.
User experience is at the core of IT delivery. Designing a cybersecurity systems which allows authorised users access to the data and information they need, when they need it, is actually a key component of Information Security; hence the CIA triad of Confidentiality, Integrity and AVAILABILITY.
The essence of cybersecurity is supporting the delivery of strategic business objectives. A cybersecurity architecture that mainly prioritises protecting data and information from access by unauthorised elements (Confidentiality), ensuring data remains in its intended state (Integrity), but fails to make data and information accessible, in a consumable form to authorised user, as and when they need it, cannot be effective at delivering business outcomes.
Situating cybersecurity architecture on all the legs of the CIA triad is a business imperative.
-
Xchange Advocates are recognized AV/IT industry thought leaders and influencers. We invite you to connect with them and follow their activity across the community as they offer valuable insights and expertise while advocating for and building awareness of the AV industry.
Please sign in or register for FREE
If you are a registered user on AVIXA Xchange, please sign in