More articles:
2017   2018   2019   2020   2021
2022   2023   2024   

2023-02-02 00:00:00

Books|Securitycrisis|cyber|eric cole|lessons|protection

10 cornerstones for managing cyber security

I recently read a book titled Cyber Crisis that has a mission to convince every business manager and a person who owns a phone, computer, game console or an electronics device that cybersecurity is everyone's business. The author Eric Cole, an industry-recognized security expert, has written an easy to read book that explains why and how absolutely every organisation and every person must protect their connected devices from online threats. Here are the 10 key points that summarize the fundamentals of a long term cyber security strategy.

You are a target.

Like it or not, but everyone who has any type of device connected to the internet is a target. Perhaps you think you don't have that much money for criminals to be interested in you, or you have a virus scanner on your PC. Wrong attitude. You probably have an online bank account, and credit or debit card. They are key targets for criminals. It is likely you have a phone where attackers can install malware that, for instance, constantly clicks ads in the background, or a home security camera connected to the internet that hackers can easily turn into a tool that they remotely utilize for attacking other targets. Every computer, phone and connected device must be protected.

Cybersecurity is your responsibility.

At work and at home, security is everyone's responsibility. Although organizations may outsource complex security projects to consultants and families may ask help from a neighbor who happens to have a reputation as a computer wiz, the person who pushes the buttons, clicks the links, and downloads files to the device makes the final decisions what happens.

Security is typically built in, but not turned on in products.

In recent years, the vast number of security incidents have convinced responsible product manufacturers and software developers to include fundamental security features in their products. There was a time when vendors didn't want to turn on security features because they feared customers would complain the products are difficult to use. Now, the tide is turning. Responsible vendors ship products with basic security features switched on, and enforce users to select reasonable passwords.

Attachments and links included in email messages are the most likely danger points.

Attachments included in email messages are the easiest way for cyber criminals to deliver harmful programs to target devices. If you click on a malicious attachment, it installs itself on your PC or phone and then it does whatever it wants. Clicking unknown links included in messages (it can be a Facebook, Whatsapp, any message) can have the same effect. How do you know if an attachment or link is dangerous? You have to assume it is. If you didn't ask to get a file, don't open it. If you didn't ask for a link, make sure you know where it is pointing before you follow it.

Beware of social engineering scams as well. If " Microsoft support" calls you and instructs you to download a program to your PC or phone, don't do it.

Understand the risks and exposure.

When an organization opens its internal network for remote workers, it makes a lot of sense to do so. From security point of view it can be done, but the risks must be carefully assessed and managed. If a family wants to install security cameras inside and outside their house, and access them on their phones while they enjoy a weekend at a resort, it is perfectly all right after the security risks are evaluated and managed.

Focus on your critical data.

All major cyber security breaches have been serious incidents because criminals have stolen millions or billions of records of data from large databases. Ransomware crime where criminals encrypt organization's data and unlock it after a ransom has been paid is a successful scheme because the victims aren't sure if they can recover all the data quickly enough to continue operating normally. Ensuring critical data is backed up and rapidly recoverable is the cheapest cyber insurance.

Always backup your critical data to a storage that is not connected to the internet.

One of the recommended data backup strategies is called 3-2-1. It means having three copies of all data. Two copies are stored on different types of storage devices as the original. One of these copies is stored off site, maybe in a cloud storage or in another safe place.

There is no delete button in cyberspace.

If you have a computer or phone that is not connected to the internet, you can remove a file from the device and it really disappears forever (without going to the technical details how someone who has physical access to the device may be able to recover the file). Since practically all devices are connected to the internet and we interact in the cyberspace, the situation is radically different today. Our photos and messages are copied from node to node until they reach their destinations. There is no way knowing if the messages are saved while in transit, or if intelligence agencies are monitoring the messages. It is possible to hide the content of those messages by encrypting them but copies still exist.

If you delete a message for instance, on Facebook or let it auto-destruct on Snapchat, it will be hidden from you, but it is not deleted. It stays in the social media service's database. In an unfortunate case when hackers manage to break in to the database, all its secrets may become public information.

Detection via monitoring is the key to security.

A key lesson from the Cyber Crisis book:
"You cannot prevent all attacks."

Which leads to conclusion:
"Prevention is ideal, but detection is a must."

It means that you should do everything you can to prevent attacks, but since 100% success rate is impossible for everyone, you must have attack monitoring in place all the time, for all systems.

Always act under the premise that you are compromised.

Another key lesson from Eric Cole:
"You are probably already compromised, and if you are not seeing the signs of compromise, it's not because it didn't happen, but because you are not looking in the right place."

A few years ago, our small business conducted a cyber security planning project that started from the assumption that we were hacked. We worked backwards from there. The project was the most valuable security exercise participants has so far contributed to. It changed the way we think about security, and how it became part of our normal daily work.

News

2026-01-27 15:27:00

Judged anonymously by an international panel, the 2025 TPOTY shortlist was selected from more than 20,000 entries across 160 countries, making this one of the most competitive #travel #photography competitions in the world.https://www.digitalcameraworld.com/photography/awards-and-competitions/the-worlds-best-travel-photographs-are-crowned-and-the-winning-images-are-simply-stunning


News

2026-01-22 17:33:00

A survey revealed the level of trust people have in their fellow citizens in 90 countries across the world. Here is the top 50 countries where people trust in other people the most. #travel #safety .https://klaava.com/when-traveling-do-you-trust-people-overseas-here-is-how-much-locals-across-the-world-trust-their-fellow-citizens/


Evening in the historic center of Montpellier.

2026-01-21 16:00:50

arihak

Evening in the historic center of Montpellier.


News

2026-01-08 15:26:00

While residents’ concern about masstourism in some countries in #Europe is real, where do Europeans themselves #travel when they want to enjoy a week-long break? .https://klaava.com/where-europeans-like-to-travel-for-one-week-holiday-in-the-eu-region/


Statues guarding a castle in Copenhagen.

2026-01-07 17:08:46

Statues guarding a castle in Copenhagen.


Wide open Atlantic Ocean

2026-01-04 12:50:32

arihak

Wide open Atlantic Ocean


News

2025-12-26 14:41:00

If we look at the millions of tourists who will travel somewhere they haven’t visited before, we can discover trends that are gradually changing how and where we travel. Here is our take on #travel #trends for #2026 .https://klaava.com/travel-trends-2026-road-trips-calm-and-quiet-ai-assistants-and-popular-culture/


Just in case you forgot to bring your own #book to the port

2025-12-24 17:12:21

arihak

Just in case you forgot to bring your own#book to the port


News

2025-12-24 08:24:00

I downloaded a #phone app with a “zero-processing” feature that claimed to take photos without any software alterations. When comparing the photos my phone #camera takes automatically to the photos taken with this app, the results were shocking. #photography .https://www.theguardian.com/commentisfree/2025/dec/23/smartphones-photos-filters-pictures-software


News

2025-12-16 08:59:00

9 professional #cyclists produced enough power on pedals for an ultralight airplane to take off in Mallorca.https://elpais.com/deportes/ciclismo/2025-12-15/las-alas-de-red-bull-como-nueve-ciclistas-despegan-un-ultraligero-con-sus-pedales.html


News

2025-12-11 16:33:00

Person of the Year focuses world’s attention on the people that shape our lives, TIME editor-in-chief Sam Jacobs wrote. “this year, no one had a greater impact than the individuals who imagined, designed, and built #AI.”--- ok, but is the Editor a person or AI?https://www.euronews.com/culture/2025/12/11/time-person-of-the-year-2025-announced-the-architects-of-ai


News

2025-12-10 08:31:00

Here is the index for the top 30 cities in the world for moving around on a #bicycle. #travel .https://klaava.com/if-you-like-to-explore-cities-you-visit-by-bicycle-here-are-the-best-destinations/


Nice quiet morning, but do scooter manufacturers know about electric vehicles?

2025-12-04 17:49:27

arihak

Nice quiet morning, but do scooter manufacturers know about electric vehicles?


News

2025-12-04 16:40:00

Data from the world's leading hotel groups, travel firms and trend forecasters suggests that 2026 will be the year of quiet escapes, algorithm-shaped itineraries, ultra-personalised retreats and a return to slower, more intentional #travel.https://www.bbc.com/travel/article/20251201-seven-travel-trends-that-will-define-2026


News

2025-12-01 11:01:00

It’s not the tool that matters, but the mind behind it. Perhaps the real question for any #photographer today is not what technology can do next, but what remains worth doing by hand—what still carries the trace of human attention.https://fstoppers.com/opinion/how-photographers-made-themselves-replaceable-714901


News

2025-11-24 11:23:00

It is possible to do a day trip from Madrid, for instance, to Segovia or Avila, or plan a tour that covers all four cities. #Europe #travel .https://klaava.com/four-cities-near-madrid-that-give-visitors-a-taste-of-the-real-spain/


Going down fast.

2025-11-22 16:00:12

arihak

Going down fast.


News

2025-11-16 17:19:00

Confirmed, the peak #travel season in #Europe is longer:“Normally we expect some traffic until the first week of October and then a slow fading until early November, but it has been nonstop.” It was, he says, the busiest October he has ever known.https://edition.cnn.com/2025/11/15/travel/europe-tourism-fall-peak-season


News

2025-11-10 11:33:00

Everything was fine until the Halloween weekend when our journey turned into a nightmare. Suddenly, I couldn’t charge the van from public chargers anymore. #EV #chargerhttps://klaava.com/nitpickers-travel-journal-bank-meddled-with-ev-charging-payments-causing-us-a-halloween-nightmare/


News

2025-11-07 08:40:00

Compact cameras are back, primarly high-end models::They're not competing with your iPhone. They're offering something your iPhone can't deliver: optical quality that's genuinely professional. #camerahttps://fstoppers.com/historical/rise-and-fall-point-and-shoot-camera-715387?utm_source=FS_RSS&utm_medium=RSS&utm_campaign=Main_RSS


More articles:
2017   2018   2019   2020   2021
2022   2023   2024