Analogy of control types in Cybersecurity

October 8, 2022
Analogy of control types in Cybersecurity

Cybersecurity layers of protection

I’ve said that adding more layers of security may make your data safer in order to clarify why we need firewalls, antivirus software, and passwords in addition to security solutions (if done right). Making a hacker clear as many hurdles as you can before they can access your sensitive data will lower your risk.

Here, locking up the royal jewels is the parallel. Then you close the lockable chest that is enclosed in the vault and place the box inside. If you want to take the comparison a step further, you might imagine everything as being contained inside a fortress that is encircled by castle walls and all of which is guarded by a moat.

Putting extra security measures in place might make it more difficult for the wrong individuals to access your sensitive data, even if a hacker manages to get past one tier of defense. Because of this, you often need to go through numerous stages, such as inputting a password to access your computer, another one to access a particular program or service, and then utilizing 2-factor authentication to confirm your identity.

Cybersecurity arms race

When it comes to cybersecurity, both sides are continually improving their weapons and defenses, much as in an arms race. You must constantly improve your security plan or you risk falling behind the pack while using a sword and shield to fend off fighter jets.

On the one hand, hackers are continuously developing new phishing tactics, making new and more deadly varieties of malware, constructing traps for victims to fall into, and looking for new weaknesses to attack.

On the other hand, in order to avoid becoming a victim of new threats, the good guys need to create safeguards against them, update security software definition files continuously, patch software and operating systems on a regular basis, be vigilant online and inform everyone in their organization about them.

Your primary email holds the keys to many other accounts

Recently, we had to explain to a computer newbie why hackers may potentially access other accounts tied to the main email account if they get access to it (banking, shopping, secondary email accounts, etc.).

The analogy we used to make everything make sense was as follows: Assume that your family members dwell in several homes, and you store the keys to each location at your principal household. If someone breaks into the main home, they may enter the other residences as well since they have access to all the keys. You must thus replace the locks at every residence if you want to be secure; otherwise, you risk another break-in.

This entails updating any account passwords that are connected to your main email address in the real world. Make sure that no one has tampered with your associated cellphone numbers, backup email addresses, and security questions across all of your accounts, since these are additional entry points the bad guys may use even if the primary passwords are changed.

Call +1 416-471-4545 or go to https://www.cybercert.ca/ to receive your 25% discount on all cyber security courses.

Recent Posts

How to Prepare for the CISSP Exam: Tips and Resources
April 27, 2023

How to Prepare for the CISSP Exam: Tips and Resources

The Certified Information Systems Security Professional (CISSP) certification is a highly sought-after credential in the field of information security. It is a vendor-neutral certification that is recognized globally and indicates a high level of proficiency in the field of cybersecurity. Passing the CISSP exam requires a lot of dedication, hard work, and preparation. In this […]

Read More
The Best Practices and Standards for CISSP Professionals
April 25, 2023

The Best Practices and Standards for CISSP Professionals

CISSP (Certified Information Systems Security Professional) is a globally recognized certification for information security professionals. CISSP professionals are expected to possess a broad range of knowledge and skills in various security domains, such as access control, cryptography, security operations, and software development security. However, possessing knowledge and skills alone is not enough to excel as […]

Read More
How to Optimize Your Cloud Costs and Performance
April 23, 2023

How to Optimize Your Cloud Costs and Performance

In today’s world, businesses rely heavily on cloud computing to store and process their data. The cloud has become an essential part of modern computing infrastructure, providing businesses with cost savings, scalability, and flexibility. However, the benefits of cloud computing have some challenges. One of the most significant challenges businesses face is how to optimize […]

Read More