[A]ll companies need to re-calibrate their security configuration from network-centric to data-centric. Here’s the 50,000 foot view of what I recommend to Taia Global clients:

Identify - Isolate - Monitor - Terminate

1. Identify your most critical data, then isolate it from the rest of your network.
2. Identify who is permitted to access that data, establish norms of access for each individual, then monitor that access in real-time.
3. When an authorized person breaks their norm of access, or when an un-authorized person gains access, it alerts to a security dashboard and the connection is temporarily terminated until verification can be made.

With this level of protection, it doesn’t matter how the bad guys got in or where they’re from. All that matters is that they aren’t leaving with your data.