Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

What is adequate, good or appropriate cyber security ?

A number of standards such as EU GDPR simplify the amount of Cyber Security an entity should have by using the term “appropriate security”. Others  say you need good cyber security or adequate cyber security. But what does this mean? How do you achieve it?

From an attacker’s perspective  good or appropriate cyber security makes it too hard to be successful in a cyber attack. Therefore if we knew the details of every cyber attack couldn’t we just protect against all of those?

The list of known attacks, exploits and vulnerabilities is in the millions.  This is too large. We need a filtered list which has found the patterns and applied it to a list of cyber security protections (controls).

The good news is a group of over 100 people have already done this! They have used their experience and their list of vulnerabilities to identify the patterns and the appropriate controls that could have prevented past attacks as well as known attacks. They have built it into a standard called ISO27001.

Rather than re-invent the wheel, we can just say appropriate security is a budget and risk based implementation of ISO27001. The budget and risk based approach means that you can accept to skip some things until you have the budget for it. There is no reason any company can’t be ISO27001 aligned with a budget and risk based approach.

There are other Cyber Security standards but their history was built for different reasons and without as many people. I’d say stick with ISO27001 unless there is a very big reason not to do so.

Vertex helps companies every day achieve ISO27001 alignment and certification so if you need some help with this approach feel free to contact us.

CATEGORIES

Cyber Security - ISO27001

TAGS

adequate cyber security - adequate security - appropriate cyber security - appropriate security - good security - ISO27001

SHARE

PrevPreviousMany Cyber Security vulnerabilities are because humans make mistakes
NextPenetration Test vs Cyber Review vs Cyber AuditNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.