Thursday, April 24, 2014

Cybersecurity is not just a freak’s thing

People look at me like I was a freak. Not because my Dalí’s style mustache. Nor because I like to sing using broccoli as micro while I work out. The truth is that everyone looks at me like I was an alien when I tell them I work in cybersecurity.
Although users’ knowledge about the protection and the precautions for their electronic devices is gradually increasing, a large majority still are not aware of the risks of the Internet and look to the field of information security as something from another planet. Therefore, they can easily become victims of cybercrime.
For an average user it would be difficult to recognize the malicious nature of the spam campaign that has flooded Twitter in the last hours. And if their accounts have been affected, it would be even more difficult for them to understand why there are posted some tweets that they didn’t write.
It is also possible that a worker who writes down their passwords on a sheet is not fully aware of the consequences of losing such piece of paper. For example, recently a Skymark Airlines worker lost a memo with security codes of Tokyo’s airport just before Obama’s visit to the country, so the airport’s security team was forced to change all the keycodes of the building.
Bitcoins? Bots? There are many users who have no idea what those terms mean. So telling them that 5 servers from Iowa State University (U.S.) were hacked to mine bitcoins would leave them with poker face. If after that, you dare to say that United States is the country that produces nearly half of malicious bot traffic in the world, according to Distil Networks, then you actually deserve that they look at you like you were a freak.
Perhaps they would listen to you more carefully if you explain to them the hazards around their mobile devices. At least in Spain, according to an online survey by Just Eat, 61% users declare themselves addicted to their smartphone, especially to instant communication apps and social networks. Another issue that may take their attention is the use of proxies to bypass access restrictions and surf the web in a more anonymously way. But obviously it is better not to mention the word “proxy” if you want them to listen to you.
From the CIGTR we encourage you to not let bored or strange faces make you give up. Let’s keep evangelizing about cybersecurity to make it more difficult for the bad boys.
We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment