Not all systems and data are created equal

Harmony Internal - McKinsey

Focus on the most important ones ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities

McKinsey Classics | March 2023

Image of a computer server

Not all systems and data are created equal

Some systems and data are more important than others. Some are more exposed to risk. And some are more likely to be targeted by criminals. In a digitized world, it’s hard to protect everything equally well.

Different sectors of the economy have different critical assets. For hospitals, the most sensitive thing is typically information on patients. Aerospace companies must above all guard their intellectual property. Financial-services firms are vulnerable to fraudulent transactions, and their M&A databases need the best protection money can buy.

Most large companies now recognize the severity of cyberthreats. But they tend to treat these risks as a technical issue, not a business problem, so that the needs of the enterprise as a whole are often lost. To put those needs front and center, business units should collaborate with the cybersecurity, IT, and risk functions to determine which information assets are priorities for the entire company, how likely they are to be attacked, what should be done to protect them, and who the likeliest attackers might be. Likewise, any subsequent action should take place on a company-wide scale.

To learn more, read our classic 2017 article “Protecting your critical digital assets: Not all systems and data are created equal.”

 Roger Draper, editor, New York

Learn how and what to protect
LinkedIn Twitter Facebook

Related Reading

Telescope on a ship with two birds flying over the water in the background

Marc Chiapolino, Filippo Mazzetto, Thomas Poppensieker, Cecile Prinsen, and Dan Williams, “Risk and resilience priorities, as told by chief risk officers” 

Image of a large worker in a warehouse

Knut Alicke, Ed Barriball, Susan Lund, and Daniel Swan, “Is your supply chain risk blind—or risk resilient?” 

Digital illustration of a cyclical shape representing cybersecurity

Jim Boehm, Nick Curcio, Peter Merrath, Lucy Shenton, and Tobias Stähle, “The risk-based approach to cybersecurity” 

Image of a ledger

Dispelling the mystery of zero-based budgets

ZBB can cut SG&A budgets by 10 to 25 percent, often within six months. Yet it remains a mystery for many executives.

Learn how to cut budgets intelligently 

LinkedIn Facebook Facebook

Share these insights

Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.

This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.

You received this email because you subscribed to our McKinsey Classics newsletter.

Manage subscriptions | Unsubscribe

Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007


by "McKinsey & Company" <publishing@email.mckinsey.com> - 11:45 - 18 Mar 2023