In the past, I’ve spent hours on the phone trying to show someone how to configure an email client.
Normally intelligent individuals suddenly become dummies when faced with anything “technical”.
Individuals are routinely breached because they are either
Too busy to care about basic hygiene (tech bits)
Have no password management skills
Have no trusted technical support partner
Do not monitor their set-up
…or most importantly, not bothered.
These same individuals take extreme cause with their daily online banking.
As a Small Business or individual, If you were going to hire a Private IT Security Professional here’s what you should be looking for.
Loving this 2016 IT Security Job Description
Experience as part of an incident response team (either in-house or as a consultant).
An ability to provide technical analysis and direction for investigations.
An understanding of networking protocols and infrastructure designs; including, firewall functionality, routing, encryption, host and network intrusion detection systems, load balancing, and other network protocols.
An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security.
Willing to work out of hours and public holidays as part of a shift Rota and when on call as needed.
Inherent passion for information security and service excellence.
An ability to analyse and reverse engineer various file types including providing dynamic and static analysis of malware artefacts and binaries as well as other malicious attack files.
Be able to complete post-mortem analysis of network logs, traffic flows and other activities to identify malicious activity on a network.
Outside the InfoSec community and Paranoid conspiracy addicts, I seldom come across individuals who routinely check themselves to see how open they are to attacks.
Handy Hacker toolkits always include
Ransomware
Phishing Vulnerability
“New to YouTube" Vulnerability
Bot Infection
Browser Attack
Anonymizer Usage (hide yourself tools)
Data leakage
(on purpose or by sheer end-user stupidity)
In the meantime, while everyone is debating the impact of leaving Europe, the Investigatory Powers Act 2016 is filtering down to individuals as it’s now a tool for “lawful” interception of data.
So now you gotta look out for the bad guys, the marketing people AND Big Brother.
Solution: Encrypt EVERYTHING
Things just got Real…gonna go take my some Diphenhydramine so I can catch at least 6 hours deep sleep tonight.
I use cookies and similar technologies to collect and process personal data that monitors your activities and preferences.
I assume you accept this.
Press StartPrivacy policy