{"id":5374,"date":"2022-08-20T15:14:00","date_gmt":"2022-08-20T15:14:00","guid":{"rendered":"https:\/\/prolifics.com\/us\/?p=5374"},"modified":"2025-10-15T15:13:41","modified_gmt":"2025-10-15T09:43:41","slug":"when-it-comes-to-cybersecurity-you-do-have-to-sweat-the-small-stuff","status":"publish","type":"post","link":"https:\/\/prolifics.com\/usa\/resource-center\/blog\/when-it-comes-to-cybersecurity-you-do-have-to-sweat-the-small-stuff","title":{"rendered":"When it Comes to Cybersecurity, You DO Have to Sweat the Small Stuff"},"content":{"rendered":"\n<p>With data breaches and <a href=\"https:\/\/prolifics.com\/usa\/resource-center\/blog\/stay-safe-look-out-for-ransomware-and-phishing\" data-type=\"link\" data-id=\"https:\/\/prolifics.com\/usa\/resource-center\/blog\/stay-safe-look-out-for-ransomware-and-phishing\">ransomware<\/a> dominating headlines, we spoke with Mike Hahn, Head of Security Practice at Prolifics, to get expert insights into why cybersecurity starts with the small details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Q&amp;A: Insights from Mike Hahn on Cybersecurity<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Q1: Mike, what\u2019s your initial advice when people ask about cybersecurity?<\/h3>\n\n\n\n<p><strong>A:<\/strong> I often use Facebook as an example. People give away personal data constantly through polls, quizzes, and surveys \u2013 \u201cWhat\u2019s your first car? Your birthday? Your favorite color?\u201d This seemingly harmless information is collected and commoditized. In today\u2019s world, data is currency, and protecting it is non-negotiable. Cybersecurity begins with understanding what information you share and how it can be exploited.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q2: So, are people giving out information too easily?<\/h3>\n\n\n\n<p><strong>A:<\/strong> Exactly. Most people don\u2019t connect security with privacy. For example, if your insurance provider or online retailer exposed your birthday, you\u2019d be furious. Yet, when a Facebook quiz asks for your birthday, people participate without a second thought. Organizations must audit and secure personal data effectively\u2014ignoring this is a risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q3: How does this translate to corporate security?<\/h3>\n\n\n\n<p><strong>A:<\/strong> About 90% of breaches are due to human error. Clicking a malicious link or sharing a piece of information can expose an entire system. With enough data, systems can predict passwords or login behavior. What seems trivial now can determine the impact of a breach later.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q4: What are some other common cybersecurity missteps?<\/h3>\n\n\n\n<p><strong>A:<\/strong> Many organizations skip basic maintenance: not patching systems, avoiding reboots, ignoring encryption. Policies exist, but adherence and audits often fail. Routine security hygiene is non-negotiable \u2013 it\u2019s the foundation for preventing breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q5: Why do these mistakes happen so often?<\/h3>\n\n\n\n<p><strong>A:<\/strong> Information overload is a major factor. Security teams face alerts daily, some of which are false positives. Over time, people stop paying attention. Remember: security is 60% human vigilance and 40% technology. Alignment between IT and cybersecurity goals is essential to ensure systems and teams respond effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q6: Is cybersecurity as dramatic as movies show?<\/h3>\n\n\n\n<p><strong>A:<\/strong> Not at all. Most breaches occur in <strong>small, seemingly insignificant ways<\/strong>. Hackers only need to be right once; security professionals must be right 100% of the time. Internal errors or external attempts can compromise systems without flashy attacks. The key mindset: assume breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Q7: Any solutions or preventive measures?<\/h3>\n\n\n\n<p><strong>A:<\/strong> Automation is a game-changer. For instance, if someone tries to log in multiple times in a second, automated systems can immediately block the account. Think of it as a \u201csecurity wingman\u201d \u2013 vigilant around the clock, even when humans can\u2019t monitor systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Join Mike Hahn in the Prolifics Innovation Sandbox<\/h2>\n\n\n\n<p>The Innovation Sandbox returns live on Thursday, Aug. 5 at 10 a.m. ET with \u201cTop Guns of Cybersecurity.\u201d Learn how automation, cloud solutions, and best practices can elevate your organization\u2019s security posture. Experts Michael Hahn (Prolifics), Mark Neumann (IBM), and Kirsten Craft (Prolifics) guide you through today\u2019s cybersecurity challenges. <a href=\"https:\/\/prolifics.com\/usa\/events\/innovation-sandbox-top-guns-of-cyber-security\" data-type=\"link\" data-id=\"https:\/\/prolifics.com\/usa\/events\/innovation-sandbox-top-guns-of-cyber-security\">Register here<\/a> to secure your spot.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About Michael Hahn \u2013 Head of Security Practice, Prolifics<\/h2>\n\n\n\n<p>Michael Hahn brings 20+ years of cybersecurity advisory and consulting experience across Fortune 500 and government clients. He is recognized for enabling resilient, secure IT solutions, bridging the gap between technology, human behavior, and organizational strategy.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With data breaches and ransomware dominating headlines, we spoke with Mike Hahn, Head of Security Practice at Prolifics, to get expert insights into why cybersecurity starts with the small details. [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":5396,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[49],"tags":[],"class_list":["post-5374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"builder_content":"","_links":{"self":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/5374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/comments?post=5374"}],"version-history":[{"count":0,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/5374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media\/5396"}],"wp:attachment":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media?parent=5374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/categories?post=5374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/tags?post=5374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}