Bob Young on Nostr: Cybersecurity and cybercrime explained: Glass blowers and other glass artisans have a ...
Cybersecurity and cybercrime explained:
Glass blowers and other glass artisans have a lot of skill. Glasswork isn’t something you learn quickly. It takes time and effort to learn how to make beautiful, delicate works of art.
But any fool with a hammer can destroy it.
Yes, there are some cybercriminals with skillz. But the reality is, most cybercrime is as subtle as a hammer.
The cybersecurity expert creates a sophisticated work of art, with encrypted storage, an access control list, and MFA.
The cybercriminal sends a phishing email, and the victim swings the hammer for them.
Spend the money to segment your network.
Decentralize as much as you can.
Take non-essential data offline.
Stop thinking all data is equally essential to daily operations.
Stop making everything Internet accessible.
Eschew the cloud for anything other than sales and marketing.
(Photo credit: Google Gemini)
Published at
2025-03-08 18:29:37Event JSON
{
"id": "9dd06766b928286b604f0bdd6346deaee8495cafab24183fdc52fbc94c15b53f",
"pubkey": "6d3781dc5e61c9673b1587daf950cd9d40770dab2d722cb87b1865bc2cc8135d",
"created_at": 1741458577,
"kind": 1,
"tags": [
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/128/227/808/924/843/original/30229c4465770351.jpeg",
"m image/jpeg",
"dim 1440x1440",
"blurhash UdIq=St6e.tQ_NozkCaeRPayfQj[Rje.aekC"
],
[
"proxy",
"https://infosec.exchange/users/fifonetworks/statuses/114128229311074833",
"activitypub"
]
],
"content": "Cybersecurity and cybercrime explained:\n\nGlass blowers and other glass artisans have a lot of skill. Glasswork isn’t something you learn quickly. It takes time and effort to learn how to make beautiful, delicate works of art.\n\nBut any fool with a hammer can destroy it.\n\nYes, there are some cybercriminals with skillz. But the reality is, most cybercrime is as subtle as a hammer.\n\nThe cybersecurity expert creates a sophisticated work of art, with encrypted storage, an access control list, and MFA.\n\nThe cybercriminal sends a phishing email, and the victim swings the hammer for them.\n\nSpend the money to segment your network.\nDecentralize as much as you can.\nTake non-essential data offline.\nStop thinking all data is equally essential to daily operations.\nStop making everything Internet accessible.\nEschew the cloud for anything other than sales and marketing.\n\n(Photo credit: Google Gemini)\n\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/128/227/808/924/843/original/30229c4465770351.jpeg",
"sig": "eb5216f107c413a591e2c70fdaae0b8dc4a25f84a8e72328dfe7645a277c9b1b3d3aa6bd178f604e19b2f38a173171555660f86027adc0b520948f627b6c855c"
}