<img alt="" src="https://secure.easy0bark.com/244345.png?trk_user=244345&amp;trk_tit=jsdisabled&amp;trk_ref=jsdisabled&amp;trk_loc=jsdisabled" height="0px" width="0px" style="display:none;">
Skip to content
Talk with Sales
    February 14, 2017

    Applying the Rule of 80/20 to Protect Your Network

    mation 80-20.jpgIT support and security is a business no-brainer. Every company, regardless of size or industry, must be concerned with protecting and supporting its network. Now, experts recommend using the well-known 80/20 rule as a general business template, as well as a guiding principle for your IT security. So, what is the 80/20 rule and how can it shape your security protocols?

    The Pareto Principle

    The 80/20 rules, also known at the Pareto Principle, essentially means that 80 percent of consequences result from 20 percent of the causes. In business, the 80/20 rule or law of vital few can mean that 80 percent of your sales come from 20 percent of you clients. Or, put another way, the smallest vulnerabilities typically lead to the biggest losses. When applied to your network, this principle takes on a clearer meaning. It is imperative that your security protocols be comprehensive and not just focus on the big picture.

    Security Protocols

    When you look at the Pareto Principle in the context of IT security, it means that the greatest data losses result from the smallest weakness. For example, an enormous data breach at a company could be caused by something seemly small, like an insufficient user password. In the grand scheme, that “small” issue is, in fact, the cause of a much larger problem.

    Applying the Rule

    So, how does this theory help you determine your safeguards and IT support? It certainly highlights the need for extensive protection and can be used to help you prioritize your resources to safeguard your data. Although not every concern can be given the highest level of priority, focusing on the “top” 20 percent presents an optimal starting point for your security initiatives. Since there are too many cyber threats to accurately identify all of them, use the Pareto Principal to hone in on those which present the greatest threat and where you can most effectively protect your network.

    Ronnie Hay

    Ronnie Hay is the Marketing Director for UBEO.

    Other posts you might be interested in