Seeing the Bigger Picture: Why Security Needs Depth, Not Just Products

July 24, 2025 | by ambercarey

A recent BBC article, “Weak password allowed hackers to sink a 158-year-old company,” outlined a serious security lapse. This case reinforces the message that we, at Teneo, advocate every day: true resilience comes from defense in depth, i.e. policy, product and process, not just tools at the edge.

In a recent customer engagement, we discussed a transition from VPN to ZTNA. While ZTNA offers enhanced security including continual checking, improved segmentation and a minimized attack surface. It alone is not enough, which is why we also discussed:

  • Security policy
    Are access controls and segmentation policies aligned with corporate objectives?
  • End-user training
    Do users understand their role in security hygiene—MFA, phishing avoidance, handling of sensitive data?

Why go the extra mile? Because advanced tools, no matter how sophisticated, don’t operate in isolation. They only shine when backed by informed people and rigorous processes.

Defense in Depth: The Teneo Way

Teneo’s approach is anchored in these foundational principles:

  1. Layered Controls
    We don’t just deploy firewalls and ZTNA solution, we understand that each control complements others: endpoint detection, least-privilege identity, continuous monitoring, incident response alignment and so on.
  2. Human-Centered Design
    Security policies are only effective when comprehensible. We collaborate with stakeholders to translate strategy into everyday actions, avoiding gaps caused by misunderstanding or friction.
  3. Continuous Education
    Cyber threats evolve rapidly. We embed training and simulated drills, tabletop exercises, phishing tests, policy refreshers to ensure teams stay sharp and proactive.
  4. Iterative Validation
    Post-implementation, our engagement doesn’t stop. We offer support with penetration tests, red-team exercises, policy audit cycles. This ensures early detection of misconfigurations or gaps.

More Than a Tool, a Culture

The BBC story is a stark reminder that breaches often occur where defenders least expect them, through gaps in policy, awareness, or human error. At Teneo, we take every tool deployment as a starting point, not the finish line.

Security isn’t a product, it’s a practice. When we design solutions, we embed:

  • Strategic thinking: What threats really matter here?
  • Operational alignment: Can users and IT staff actually follow the policy?
  • Real-world preparedness: What happens if a breach occurs?

That is true defense in depth. We’d happy to discuss your defense strategy.  Let’s talk.

Author:

Brett Ayres, CTO, Teneo

Contact us - We’d love to help you





    Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.

    Cookie Policy
    Teneo Logo

    This website uses cookies so we can provide you with the best user experience possible.

    Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.

    Our cookie policy tells you how and why we use cookies, and how this allows us to improve your online experience. You can read our full Cookie Policy here.

    Strictly Necessary Cookies

    Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.

    Third Party Cookies

    Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.

    Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.