Amid the tsunami of cybersecurity spending, there is remarkably little consensus on reliable sources for cyber defense. With cybersecurity spending projected to rise to $6 trillion globally by 2021, where in all of economic and industry history has so much been invested with so little consensus or assurance of knowledge?

Even a glance at this situation reveals that the lack of cybersecurity information itself is part of what impels the phenomenal rates of spending. The highest stakes imaginable, and an unprecedented circumstance of mystery, face us simultaneously wherever we work – in business, industry, public utilities, military service, or government – because the field is so ever-changing and so devoid of recognized authorities. The Department of Homeland Security defined its own strategy for cybersecurity as recently as May 16, 2018.

How could such an accomplished global business community arrive at such a disadvantage as this, lacking clear sources of cybersecurity information? Analogies are called for to see it clearly, because rarely, if ever, have human beings confronted circumstances like these in all the experience and discernment of history.

New Insights from an Old Source

Paradoxically, one of the most useful sources we see for cyber defense information is from the old “phone company.” The continuing series of Cybersecurity Insights from AT&T has proven to be at least a good starting point. But the biggest, most widespread help we can offer in this field has to do with a whole, vast sector of the cybersecurity perimeter that is, to a shocking extent, left unguarded. That unguarded sector is the physical connection, the billions of ports and connectors that enable us to operate our computer data and information systems effectively every day.

When cybersecurity concerns exploded, the industry attention to address them was initially devoted almost entirely to the non-physical space. The USB ports and system connectors that were within sight and reach of all of us went unattended. This untended physical sphere of cybersecurity has been likened to a homeowner leaving the front door open, while continually and aggressively increasing one’s spending on window sensors, motion detectors, video monitors, and remote home-management systems. No matter how sophisticated the solutions, the front door is still wide open.

Expertise and Products to Protect the Front Door

At The Connectivity Center, we have used our unequalled perspective on the nexus between users and technology to assemble, develop, maintain, and expedite a resource for cyber defense products you can rely on immediately. Our experience, perspective, and ongoing awareness extends from the time when servers began replacing mainframes, and dispersed computer operations vastly and rapidly expanded the exposure to mishaps and threats, all the way through today and tomorrow in an unbroken continuum of expertise. And this perspective is yours, at your service.