Author Jim Collins wrote in his book ‘Great by Choice’ that another quality that made some organisations successful compared to their comparison set was the reliance on empirical creativity.
They rely on direct observation, practical experimentation and direct engagement with tangible evidence.
They fire what Mr. Collins described as small bullets instead of Cannonballs.
This means they test, gather data and make decisions based upon their findings.
A bullet is an empirical test aimed at learning what works.
Amazon’s Obsession with Test
Jeff Bezos, Amazon founder and CEO, once said that he believes in physics and science; everything else is up for discussions.
Amazon probably conducts more test than any other business on planet earth.
Every single change on Amazon’s website is tested for months before being fully rolled out.
The reason successful businesses rely on data is that data don’t lie.
There is subjectivity with the interpretation of data, but the data itself is completely objective.
Cyber Attack Data
The last few years have witnessed the rise of cyber attack.
The data is there to backup this statement.
Hackers are getting bolder, going for more lucrative targets.
The attacks on Marriot Hotels or Sony were brazen attacks, an attestation that hackers are becoming bolder.
Last year hackers almost shut down the entire UK healthcare system.
The nation of Estonia was attacked and even Amazon suffered cyber attack.
There are lots of cyber attacks on a daily basis that do not make the news headlines.
Penetration Testing the Solution
As a matter of fact, many businesses have funds set aside for cyber ransom.
But instead of setting funds aside for ransom payment, what business need to do is take proactive actions to prevent their network from being hacked in the first instance.
Penetration testing is the most effective cyber attack countermeasure.
Penetration testing allows organisations to identify vulnerabilities in their system before they are spotted by hackers.
The data is there.
It’s a matter of whether you are prepared to conduct penetration test on your network to strengthen the vulnerabilities or you take the chance.