4. Change only what needs to be changed: What would you do if you brought your
car to the garage for an oil change and when you pick it up the mechanic tried
shaking you down for extra money by saying he noticed some other things that
needed to be fixed and did the work without your permission? You probably
would blow a gasket and never return to that garage. Why should your network
and IT systems be any different? Having a disciplined change management
process prevents well-intentioned or plain-old-ignorant technicians from introducing
unplanned changes that can actually cause more harm than good. Make
sure you have positive control over all changes to minimize the risk of surprises
and exposure to threats.
5. Don’t be afraid to ask for help: Asking for help is difficult for many people. They
mistakenly believe that it will be seen as a sign of weakness, whereas it actually
is a sign of wisdom. In today’s increasingly complex cyberspace environment,
asking for help often is not an option; it is a requirement. One of the things that executives do is build effective teams. When confronted by vexing problems that
are beyond the skill or expertise of your team, don’t hesitate to bring in expert
consultants to assist. You also can use expert consultants to review (or even create)
your plans and procedures. Ensure you protect your intellectual property
and trade secrets with outside consultants through nondisclosure agreements and
other measures whenever you consult for help.