Every technology or system must have inherent limitations: no matter itself or its environment. Say, surveillance via CCTV for physical security, there is still the need to deploy guards patrolling the strategic locations to validate what you see if legitimate and augment the “blind spot” of CCTV coverage.
- Unmanaged limitations will develop into vulnerabilities
- Exploitable vulnerabilities will become risks
- Neglected risks will impact the business
Regular process review or system vulnerability assessment are then required for continuous cybersecurity strengthening.