Home News Citrix: “Unsinkable”: The Myth of Foolproof IT Security

Citrix: “Unsinkable”: The Myth of Foolproof IT Security

Citrix: “Unsinkable”: The Myth of Foolproof IT Security

Arguably, though, the word most commonly associated with the storied ship is “unsinkable.” The advertisement and marketing campaign prior to the ship’s launch was focused exclusively on this claim. Just look at the original marketing brochure for Titanic and its sister ship Olympic: “…as far as it is possible to do so, these two wonderful vessels are designed to be unsinkable.”

Selling this idea to the masses really worked — Titanic and Olympic were the toast of the town and tickets sold out in a flash. And this myth wasn’t just bought by consumers; no. Experts, too, started to believe this “unsinkable” idea and became overly confident.

God himself could not sink this ship — anonymous crew member

I cannot imagine any condition which would cause a ship to founder. Modern shipbuilding has gone beyond that. — Edward J. Smith, Captain of Titanic

When you believe that your preventive measures are impenetrable, when you stop thinking about contingency planning, you get complacent. Half of Titanic’s lifeboats were removed, as they were not aesthetically pleasing. Bulkheads were not watertight. Using a double hull was considered too expensive and unnecessary. Titanic was designed for a very specific scenario: a head-on collision; other scenarios were not considered. We can find many technical reasons, but in the end, it was overconfidence and the human factor that was responsible for this historic tragedy.

In recent news…

When I think about the current state of cybersecurity, I often imagine huge, slow-moving cruise ships (enterprises) navigating waters thick with pirates (hackers). Just like icebergs, most cybersecurity threats are not visible on the surface. The captains steering these technological behemoths often believe the “unsinkable” claims about their IT security only to have the rug pulled out from under them when those claims prove false. They, like Captain Smith, have to go down with their ships. We are getting used to the weekly news about the next cybersecurity “Titanic” — and many captains are trying to right their ships without bringing them to a screeching halt. But this is good news; the approach to cybersecurity is changing, with more and more companies focusing on “what-if” scenarios because they understand that security breaches aren’t just a possibility, they are likely.

Read the entire article here, “Unsinkable”: The Myth of Foolproof IT Security

Via the fine folks at Citrix Systems, Inc.

Citrix Systems Citrix (NASDAQ:CTXS) aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premise and across any device or platform. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use by more than 400,000 organizations and over 100 million users globally. Learn more at www.citrix.com.

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors