As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security professional Andrew Peterson addresses several widespread misconceptions about the hacking world so that you can be better prepared to join the fight.
You may believe hackers today are too clever and attacks are too sophisticated for you to do anything, or that your organization isn’t worth a hacker’s time. But that isn’t the case.
All organizations—from small, owner-operated businesses to large, multinational corporations—own data worth stealing and are potential, and even likely, targets for an attack. If you’re ready to take security seriously, you need to involve everyone in the company, including security and non-security professionals alike. This report provides you with an accurate picture, rather than conjecture or half-truths propagated by the media.
Table of contents
Cracking Security Misconceptions
- Misconception #1: Hackers Are Criminals
- Misconception #2: Hackers Must Be Geniuses
- Misconception #3: Hacks Are Sophisticated and Complex
- Misconception #4: Hackers Have No Reason to Attack Me
- Misconception #5: There’s No Money in Hacking
- Misconception #6: Big Organizations Are the Most Secure
- Misconception #7: If I’m Compliant, I’m Secure
- Misconception #8: There’s Nothing I Can Do to Stop Hackers
- A Way Forward
- Title: Cracking Security Misconceptions
- Release date: September 2016
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491956281
You might also like
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re …
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as …
Cybersecurity Ops with bash
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of …
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …