A story of Sheep, Wolves and Sheepdogs

So why did we name our company and our flagship technology platform after a sheep dog from the Beauce region of northern France? 

Sheep, Wolves and Sheepdogs

Malù e le pecore. Image courtesy of  Silva / Flickr . Used under Creative Commons license.

Malù e le pecore. Image courtesy of Silva / Flickr. Used under Creative Commons license.

It all has to do with the concept of sheep, wolves and sheepdogs (of which the Beauceron is a fine example of).

When modern cybercriminals or other malicious actors, the wolves in our tale, target organizations large and small, most of the time they don't start by trying to solely exploit some technical vulnerability in a network or online system. 

Instead, they bypass technology and instead target something much more vulnerable - they target an organization's people -  the flock in our story. The flock is a far more tempting target and wolves can used many simple tricks to lure them into digital traps.

According to the 2016 Verizon Data Breach report, 70% of all breaches can be traced back to attacks targeting people, known as social engineering. We believe that all cyber attacks can be traced back to one of or the combination of people, process and culture.

Standing guard over the flock, if at all, are usually a small, overworked team in the IT department and in some cases, scattered throughout an organization. Sometimes they're people who's formal job description includes a role to keep the organization safe. Other times they're just everyday people in any given department who are cyber aware and safe and take time to alert the organization to suspicious activity or active cyber threats.

These folks are the sheepdogs. 

But what if you turn more of the flock from sheep, into sheepdogs?

What if you could help turn the flock from the weak link into the most powerful part of your organization's cybersecurity? 

And you don't need to turn everyone into a sheepdog before your organization can make a big difference on its single largest cyber risk. 

Ready for a new approach?

If you're ready to try a new way of thinking about tackling cybersecurity, let's chat.