The 5 Laws of Cyber Security

Adsero’s ideal clients are medium to large businesses whose executive teams are serious about developing relationships with IT security experts who can identify, build and manage long-term solutions supported by written policies. Clients of Adsero are given the information needed to keep their systems safe. This article describes why cybersecurity protection is needed.

“How we face death is at least as important as how we face life.”

As we enter the new year, I can’t help but recall these words from Star Trek II: The Wrath of Khan — one of my favorite movies. 2017, by all accounts, ended up being the year of the hacker in many ways. From Equifax to Uber, the SEC to the NSA, it seems like every aspect of the human experience has been affected by cybersecurity and privacy concerns.

It’s inescapable in this day and age, and with the death of a year comes the new life of the next. While we can all hope that certain older relatives, friends, celebrities and musicians all survive the year, we can also hope that, despite all evidence to the contrary, we will have a year free from data breaches, vulnerabilities and malware. With 2018 shaping up to be the most prolific year hacking has ever seen given 2017, it’s time to establish a universal language and understanding of those foundational facts that govern our data-security lives.

So without further ado, here are my five laws of cybersecurity, and while there could easily be more, these five will forever be the immutable universal constants that govern this topic and our existence in relation to it.

 Law No. 1: If There Is A Vulnerability, It Will Be ExploitedAs I mentioned in my first article for Forbes: “Consider for a moment that when the first bank was conceived and built, there was at least one person out there who wanted to rob it.” In the more modern era, since the first “bug” was found in a computer, we’ve been looking for ways to bypass the framework or laws that govern a computer program, a device or even our society. Consider that there are those in our society who will try and hack everything within their capability. This could be obvious with more basic exploits, like the person who figured out how to obstruct their car’s license plate to go through a tollbooth for free, or the more obscure, such as infecting a complex computer system to derail an illegal nuclear weapons program. Finding ways around everything for both good and bad purposes is so ubiquitous today that we even have a term for it: “Life Hacking.”

 

To read more,https://www.forbes.com/sites/forbestechcouncil/2018/01/19/the-five-laws-of-cybersecurity/#794705d2265a

Comments are closed.