Skip to main content

Posts

Showing posts from May, 2020

Practicing Cyber Hygiene (Meme Edition)

In this blog, I've created some memes to add some humor whilst spreading cyber security awareness. While developers can try hard enough to produce a secure application, it is of no use if the end users are careless in their part. As users, we must protect our data and online accounts to the best of our ability.  Note that this blog is also meant to be suitable for audiences who do not have a technical background, that's why I've tried to keep it as simple as possible. However, you can read more about these topics if you wish to gain in-depth understanding. 1. Update, update, update! A vulnerability is a weakness in a software that can be exploited by attackers. When developers figure out these vulnerabilities, they patch them and release updates for you to install. As an end user, it is your responsibility to make sure that the services you use are up to date.  Turning on automatic system updates will make this task easier.            ...

Breaking the Stereotypes | Part 2 | Women in Cyber Security

There is a significant gender gap among the qualified cyber security professionals. According to the ISC2 Women in Cybersecurity survey, women working in cybersecurity currently account for about one quarter (24%) of the overall workforce. This is quite opposite to the cyber security leadership roles, where women are in higher percentages. This brings up a question: In today's world where technical professions are no more dominated by men, why do women still face hesitation when it comes to applying for technical roles in the cyber security industry? This might be because sometimes our perceptions of ourselves and our skill sets hold us back. You are female, single, married, a mother, an adventurer—who cares? These factors must not hold you back from grabbing amazing opportunities and being able to follow your passion. Mentoring A role model or a mentor can be essential for professional development and growth. The lack of females in this industry limits the opportun...

Breaking the Stereotypes | Part 1 | 'Ethical' Hacking

Hacking: The word which instantly creates a picture of a guy sitting in a dark room wearing a hoodie and doing something terrifically dangerous or something terribly wrong. Have we ever related hacking with security? Ever thought of it as something that is useful? There are plenty of stereotypes when it comes to the world of hacking. It is considered as a negative word and people are discouraged to take it up. Cracking vs Hacking By definition, the term 'cracking' means trying to get into computer systems in order to steal, corrupt, or illegitimately view data. Whereas, 'hacking' refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Even though hacking is actually done with consent and is good in nature, people still tend to call it ‘Ethical hacking’ as if to say a 'good good task'. It's important to note that the terms...