Not everyone knows 8 facts about Cybersecurity

Tram Ho

The system management career has given me the opportunity to interact with the field of cyber security, especially with many different financial institutions. With the development of technology, we have reached the point where a product can exist or disappear depending on how it is protected.

Here are some straightforward sharing that can help you in your cybersecurity career development.

Providing information alone is not enough

It is always necessary for users to know information and warn, but it is still not enough. There have been many cases despite being warned but the user for whatever reason continues to take action.

For example, telling users not to click on suspicious email links does not mean they will comply. Similarly, warning messages will become less effective over time. Therefore you will need to prepare more options.

The policies are good, but there are tools to control that are still better

Privacy policies to determine what users can and cannot do are useful for setting expectations and boundaries.

However, make sure you have the technologies to go along with these policies such as enforcing complex passwords, encrypting storage devices, monitoring and warning of security breaches, etc.

Unknown users are more dangerous than hackers

Hackers understand this because it's always easier to convince a user that you're from the IT department and need their password to fix a problem that doesn't exist rather than trying to guess the account password. .

It is ignorance that is far more dangerous than malicious schemes. That is why policies will help reduce these unfortunate mistakes.

Internet security only seduces on movies

It's rare for Hollywood to accurately describe cybersecurity. Most of the time "hackers" are shown to look attractive and interesting.

Sadly, the real life of a network security administrator is a daily hard work. By having to track logs, apply patches, attend training and read security advice to customers.

Automation is the key

It is important to learn and use any automated tools you can to make security changes. They will also work more efficiently than human intervention by hand, helping to reduce the risk of errors or risks.

Test again, test forever, test continuously

Before deploying any security-related changes, make sure you test as thoroughly as possible because there will always be unexpected results that we don't expect.

For example, disabling the old TLS protocol could lead to problems with older SQL databases. Therefore, you need to thoroughly analyze the results for both users and the system when applying changes in the test environment.

"The blanket knows lice have blankets"

It sounds frustrating, but a hacker who commits a data breach can get rich overnight, a cyber security expert can work honestly for thirty years and still struggle. stay alive.

My opinion is not to argue that it is better to leave the industry but at least when you follow cybersecurity career, you should be passionate about, not just pay for.

Security is a journey, not a destination

The system is really secure when it is inaccessible. But as long as it is connected, it will surely have holes.

There will never be a perpetual perfect method, everything will change and thus the more we have to fight constantly.

In short, cybersecurity is becoming a top concern in industries, as businesses are seeking technological solutions to protect their data from increasingly sophisticated threats and Cybersecurity. is one of the 6 main themes of Vietnam Web Summit 2019, held in December by TopDev , promising extremely valuable topics not only for cybersecurity but also for the hottest topics in the tech world: AI, Digital Transformation , Web development, Cloud-based & Intelligence-driven Cybersecurity and Digital Marketing,… don't miss it!

Share the news now

Source : TechTalk