If you think you’re secure when you protect your network perimeter, you’re going to fall short. Today, adversaries are finding ways to penetrate the network and execute codes at the system’s endpoints. If you’re only looking at the perimeter, an adversary – once inside – can operate freely without threat of detection.
Don’t approach security as just another IT issue. Everyone at the company owns the data and has a responsibility to protect the company’s core assets.