What Pain Points Do You Experience With Cyber Security?

Discussion in 'The Lounge' started by Benmclarke, Oct 9, 2019.

  1. Benmclarke

    Benmclarke Private E-2

    Hi wonderful people!

    I am looking to start a cyber security business and, to help determine what the focus of the business should be, I would like to know what pain points you experience in your day to day work in terms of managing cyber security?

    Alternatively, what cyber security services or software would you like to see that would make your personal or professional life easier??

    Thanks in advance for your time!
    Ben
     
  2. harmless

    harmless Staff Sergeant

    well, my joints are telling me it's going to rain. all kidding aside, some of us older folks do not have cell phones that can send or receive texts. everybody in the world wants to text, and i could care less about that. there are a lot of web sites out there that want you to use 2FA SMS for login, or what ever it is called, and i'm never doing that, so half of the internet might become inaccessible for me in the near future.

    in my experience, in dealing with friends and family on this issue, the core idea is education. whether it is email, a link, a web site, or whatever, they need to always be thinking, does this look odd, does that look funny, does this or that not feel right. this is the hardest part, but people have to care, they have to always think, and they have to be suspicious, first, when it comes to an unexpected event during browsing. educating people on proper behavior on their internet activity is priceless, but something most people don't put any effort into.

    good luck with it.
     
  3. Replicator

    Replicator MajorGeek

    Cyber Security is not only a vast environment, but a constantly changing one.

    A lot depends on what arena you wish to protect.....is it a complete network, a web application, a website or perhaps even a cloud based infrastructure?

    No matter how many security protocols you may have in place, there will always be vulnerabilities in a connected world

    The main pain point for me to remember is ...…….. how you respond to all incidents when any vulnerabilities may be exploited.
    How quickly are you able to counter act any intrusions before any long term damage can be done?

    This is alone will determine the success, or rather the outcome, of all malicious hacking attempts, and your ability to defend against them now, and in the future!
     
    DavidGP likes this.
  4. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Hi

    Congrats on starting a business and hope it goes well.

    Issues I have and will come more from the end user percpective this time over technical, is that security needs to have a balance in securing a network or business to usability, in which I mean can be aggressive like my workplace has this last week in introducing a new AV and security that has basically crippled to a crawl usability and prodictivity in why does Outlook say "not responding" when opening an attachment, to Excel or Access just taking ages, had the network storage drives go offline multiple times, these things today should be "click" and its there open.

    I would also utilise training of users in educating on email security on spam and phising and one thing my work does ok is to randomly send out a phishing attack email, TBH if like me you know about these things and netowrks you can see the phishing URL leads to an internal IP, but its good as if you click the link they you are automatically enrolled in the IT security taining session, we do it every year but if you click these test phishing/spam links you may end up on the course 5+ times.
     
  5. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    OH classic on this is work introduced Sophos Enterprise in the past two weeks, EVERYTHING is slow and a PITA to open a small Word doc can take minutes to open, when it should be instantatious! Pays to research the security products and also properly uninstall the old security apps, which I would imagine is the issue here in a conflict.
     
  6. Mr Grumpy

    Mr Grumpy Private E-2

    It depends what kind of cyber security you're talking about.

    When it comes to personal stuff and files, images, documents, research; I use encrypted Linux. No personal files ever touch a Windows operating system and never will so I have to keep multiple machines. The only reason I have Windows is for some software development using UWP, Visual Studio and playing AAA games occasionally. Keeping personal files on Linux also bares less chance of becoming a victim of ransomware. All other software development is compiled on Linux and is kept private.

    For passwords I use an encrypted cross platform manager, not even I know my passwords. 2FA is essential. This I have become used to, but can be time consuming to login and can be more annoying when the database hasn't synced when roaming and you cannot access a necessary password.

    I stay free of any social media due to social engineering, utilize tracker blocking and add-ons but this causes browser slowdown, which can be a tad obnoxious. I also steer clear of public Wi-Fi ALWAYS, and have to carry a paid 4G hotspot.

    For browser security it mostly common sense, although browsers are built to handle nefarious activity a lot of common sense is and education is needed, and the lesser of our tech world know how to browse with sense. Probably 5% of people I am affiliated with know what 2FA is. It's crazy.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds