Get immediate help for cyber attacks with our new Incident Response services LEARN MORE >

Services

We’re a selected team of skilled cybersecurity professionals who work as an extension of your IT staff, as well as best-in-class technology to add an additional layer of protection to your organization.

View our Managed Services
Ask About Our Outsourced Cybersecurity Program

Our comprehensive outsourced cybersecurity program leverages advanced technology and expert professionals to enhance your security without the need for in-house capabilities.
 

Learn more

Partners

We collaborate with best in the business to ensure our customers receive the highest levels of care and support. These trusted relationships allow us to better serve and educate our customers.

Regional Partner of the Year Award

Partner of the Year Award

Why Inversion6

With an abundance of solutions and providers, the task of choosing the right option is critical and can sometimes be overwhelming.

industry validation

"Thanks to Inversion6, we now have an established protocol and response procedure whenever incidents are detected. Now, we are able to act immediately to prevent a security event from becoming a larger incident."

Read Full Story

Resources

Our experts are thought leaders in the cybersecurity space. From blogs to publications and webinars, check out these resources to learn more about what’s trending in our industry and how you can stay ahead.

Why Cybersecurity Should Be Driving Your Enterprise Risk Management Strategy

By Christopher Prewitt

Read Article
Latest Inversion6 Press

CISO Craig Burland’s latest byline in Cyber Defense Magazine discusses the importance of accountability in cybersecurity.

View Story
March 12, 2019
By: Inversion6

What Makes a Good Security Metric?

Knowing the difference between good and bad information security metrics will help you use them more strategically. Learn more here.


There’s really one way to determine whether or not your information security program is working — by collecting related data and analyzing it. But the most important factor to consider is which data to share. Data on its own is not going to tell a story and will leave most people frustrated with no more insight than they had before looking at it.

We have tons of data at our fingertips, and any number of ways to arrange, report, and share them with stakeholders. But you’re not just looking to report any data — you’re looking to report metrics. What’s the difference? A metric is something you will manage by, and it drives behavior.

The Good

Gathering metrics should be a major focus — but not a major labor time-sink — for your company. You want the process to be efficient and impactful. Good metrics follow a general guideline of being:

  • Easily measured
  • Easily understood
  • Relevant to decision-making
  • Meaningful
  • Quantitative
  • Consistent
  • Aligned with your organization’s risk profile and goals

The first two are pretty straightforward: basically, don’t make things too hard on yourself or anyone else. If five people sit down to calculate a data point and all get a different answer, it’s not a good metric.

A metric should be relevant to decision-making by enabling an actionable response. For example, reporting on the number of closed vulnerabilities each month will help determine if your internal team and/or vendors are effective, or whether a change is needed.

Meaningful metrics show something that is vital to the organization’s operations. Instead of reporting the “level of risk,” which is entirely opinion-based, consider reporting the number of potential attacks per month, which is quantitative and gives a better insight into real risk.

Consistency is important when gathering data from different sources, such as vendor audits or different software programs. If you’re getting different numbers from each source, that’s not going to make for a good metric.

Finally, all metrics should align with or inform departmental and organizational goals. The point is to check performance, and performance is measured against goals.

Look for good metrics in firewall logs, web filter logs, phishing test results, helpdesk tickets, CRM/Salesforce, vulnerability scans, and other security-based reports you can easily pull. Each metric should have a measurement and a time period, and be as quantitative as possible.

The Bad

On the flipside, bad metrics will just frustrate everyone and provide no value, so they’re best avoided. Very simply put, they’ve got opposite characteristics of good metrics. They tend to be:

  • Difficult and time-consuming to gather
  • Difficult for you or others to understand without extensive explaining
  • Inconsistent
  • Meaningless or undefined
  • Irrelevant to decision-making

Aim for about an hour per month to gather metrics — anything more than that is taking up too much labor time. Don’t have opinion-based metrics or anything that can be interpreted in multiple ways.

Stick to these guidelines, and you’ll be able to put together impactful, decision-informing reports for stakeholders at all levels. Need help with your information security? At Inversion6, our chief information security officers (CISOs) are available to talk through your needs. Fill out the form below, and we’ll get in touch.

Post Written By: Inversion6
Inversion6 and our team of CISOs are experts in information security, storage, and networking solutions. We work alongside your team to implement technology solutions that are smart, flexible, and customized to fit your needs.

Related Blog Posts

Let's TALK

Our team of experts in information security, storage, and networking works alongside your team to implement technology solutions that are smart, flexible, and customized to fit your needs. Ready to learn how we can help strengthen your technology environment? Fill out the form below to get started.

TALK TO AN EXPERT