{"id":21010,"date":"2018-11-28T09:04:37","date_gmt":"2018-11-28T09:04:37","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=21010"},"modified":"2023-08-08T11:32:41","modified_gmt":"2023-08-08T09:32:41","slug":"be-defensive-what-cybersecurity-experts-do-and-why-it-matters","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/","title":{"rendered":"Be Defensive: What Cybersecurity Experts Do (and Why it Matters)"},"content":{"rendered":"<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_desktop_970x300px-1.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px-1.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Cybersecurity experts are often asked for advice on why cybersecurity is needed. Modern security means not only ensuring that you are physically safe and protecting your assets, but also includes the safety of your digital security and assets. <strong>Think about where you are the most vulnerable<\/strong>, and let that sink in for a moment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What do cybersecurity professionals do?<\/strong><\/h2>\n\n\n\n<p>The list of responsibilities for cybersecurity professionals is extensive, but essentially they are responsible for preventing online data from being compromised. According to Staffan Truv\u00e9, Chief Technology Officer of Recorded Future, &#8220;We spend a lot of money trying to fix things after they happen, but we should stop the attacks before they happen.&#8221;<sup>1<\/sup><\/p>\n\n\n\n<p>To put the price of cybercrime into perspective, an Accenture report on the costs of cybercrime was published in 2017 \u2013 detailing the average costs for a cyberattack that lasts less than <strong>30 days to total $7.7 million.<\/strong> If the cyber attack lasts longer than <strong>90 days this average cost escalates to $12.2 million.<\/strong><sup>2<\/sup><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">We spend a lot of money trying to fix things after they happen, but we should stop the attacks before they happen.<\/p>\n<p id=\"bq-name-copy\"><span id=\"bq-name\">STAFFAN TRUV\u00c9<\/span><br>CHIEF TECHNOLOGY OFFICE OF RECORDED FUTURE<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<p>If the following questions are making you uncomfortable, you should seriously consider re-evaluating some of your \u2013 and your team\u2019s \u2013 online behaviours:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When did your employees last change the password to any of their accounts?<\/li>\n\n\n\n<li>Have your employees replied with sensitive information to strange emails?<\/li>\n\n\n\n<li>Do your employees overshare moments of their life on social media by posting photographs of their houses, pets or children?<\/li>\n<\/ul>\n\n\n\n<p>All the security systems and protocols that you have paid for, installed and implemented at great cost, mean nothing if reckless behaviour is still enabling cyberattacks. For this reason, we have outlined some useful advice from cybersecurity professionals below on how to increase the security of your organisation.<\/p>\n\n\n\n<p><strong>Access vs control vs privacy: these three variables provide vulnerable entry points.&nbsp;<\/strong>Increasing risk in the digital world has seen higher cybercrime statistics since we developed technological marvels like the internet, WiFi and cloud-based systems.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_infographic_desktop_970px-1.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_infographic_Mobile_400px-1.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Why cybersecurity is needed<\/strong><\/h2>\n\n\n\n<p>According to cybersecurity experts, consider implementing these security measures to protect your business from cybercrime and losses:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Complete a cyber risk security analysis<\/strong><\/h3>\n\n\n\n<p>John Chambers, former CEO of Cisco said, &#8220;There are two types of companies: those who have been hacked, and those who don\u2019t yet know they have been hacked.&#8221;<sup>3<\/sup> Fortunately, it\u2019s not all doom and gloom. There are ways to hinder cybercriminals from targeting your organisation. Dealing with this requires businesses to be aware of the risks posed through a cyber risk security analysis.<sup>4<\/sup><\/p>\n\n\n\n<p>This entails performing an assessment on the organisation\u2019s technology and information systems, including processes, software and hardware:<sup>5<\/sup> all things required to keep the organisation running in this digital age. This becomes an essential part of the risk management strategy. According to Sanjay Deo, President of 24by7 Security, \u201cA risk assessment is often a mandatory baseline that compliance regulations ask for.\u201d<sup>6<\/sup><\/p>\n\n\n\n<p>The importance of a cyber risk security analysis can\u2019t be overstated as it:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Determines the relevance of threats to your organisation<\/li>\n\n\n\n<li>Focuses on specific internal and external vulnerabilities<\/li>\n\n\n\n<li>Assesses the impact of exploiting the identified vulnerabilities<\/li>\n\n\n\n<li>Compares the risks of exploitation<\/li>\n<\/ul>\n\n\n\n<p>Cyber risk assessments also raise awareness within the company of digital vulnerabilities by serving as an executive summary of sorts. This assists C-suite executives in highlighting specific problems without going into unnecessary details, and in determining what areas of the business need more growth and investment.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">There are two types of companies: those who have been hacked, and those who don&#8217;t yet know they have been hacked.<\/p>\n<p id=\"bq-name-copy\"><span id=\"bq-name\">JOHN CHAMBERS<\/span><br>FORMER CEO OF CISCO<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Ensure you have cybersecurity insurance<\/strong><\/h3>\n\n\n\n<p>Linking to the points above, if you want cybersecurity insurance, you will first need to have performed a cyber risk assessment.<sup>7<\/sup> It\u2019s becoming common practice to take out insurance against the harmful risks of cybercrime. Coverage for this is industry-specific and higher risk industries like retail and finance will be more expensive to insure.<\/p>\n\n\n\n<p>Scott Lockman, the Director of Commercial Insurance at Clements Worldwide states, \u201cCyber-liability protection has been around for about a decade, but insurance companies have become better at identifying risks and are able to underwrite against those risks.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Train your staff on secure practices<\/strong><\/h3>\n\n\n\n<p>Human error is the greatest threat to cybersecurity, internally and externally, for your organisation.<sup>9<\/sup> Cyrus Walker, CEO of Chicago-based Data Defenders says research shows approximately 80% of security-related incidents occur as a result of employee behaviour.<sup>10<\/sup> The major risk factor in phishing and malware attacks is simply down to human nature, and our ability to be tricked by others. <strong>The trick to ensuring that your cybersecurity is secure, is by effecting behavioural changes to the users of your system.<\/strong><\/p>\n\n\n\n<p>Most organisations don\u2019t properly train their staff on cybersecurity counter-measures. This training should be focused on everyone, up to CEO and including senior management level.<sup>11<\/sup> These people are the most likely people to be targeted due to their high-level positions within the organisation.<\/p>\n\n\n\n<p>Most criminals use three simple sets of questions to obtain key information that can be mined to allow criminals access to your personal accounts.<sup>12<\/sup> The way they gain access to this information can seem innocent, such as those fun quizzes that you complete on social media.<sup>13<\/sup><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<div id=\"bq-spacing\">\n<p id=\"bq-main-copy\">Research shows approximately 80% of security-related incidents occur as a result of employee behavior<\/p>\n<p id=\"bq-name-copy\"><span id=\"bq-name\">CYRUS WALKER<\/span><br>CEO OF CHICAGO-BASED DATA DEFENDERS<\/p>\n<\/div>\n<\/blockquote>\n\n\n\n<p>There are three common questions that may be asked to retrieve or change your password:<sup>14<\/sup><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What was your or your mother\u2019s maiden name?<\/li>\n\n\n\n<li>What was the street that you used to live on as a child?<\/li>\n\n\n\n<li>What\u2019s your pet\u2019s name?<\/li>\n<\/ul>\n\n\n\n<p>Training and awareness need to be reinforced consistently, as <strong>people allow criminals access points to sensitive data, not the internet.<\/strong> This training needs to demonstrate smart behaviours for how to interact with the digital world, to ensure you avoid making yourself the target of a cyberattack.<\/p>\n\n\n\n<p>Chairman of IoD Surrey and Managing Director of ramsac, Rob May emphasises in his TEDx speech on cybersecurity, \u201cAn intelligent person needs reinforcement of an idea at least six times, but you won\u2019t always work with intelligent people. Therefore, companies don\u2019t reinforce this as frequently as they should.\u201d<sup>16<\/sup><\/p>\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/HAR_VPAL_black_variant.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-name\">\n                HARVARD'S VPAL            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Cybersecurity: Managing Risk in the Information Age online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Make sure your top-level employees understand the impact of cybercrime<\/strong><\/h3>\n\n\n\n<p>If your board members aren\u2019t making cybercrime a priority, then there is a disconnect between their understanding of the technological landscape, and the potentially harmful and often long-term effects of cybercrime.<sup>17<\/sup> There should be board processes in place to evaluate, strategise, and handle cybercrime.<\/p>\n\n\n\n<p>May succinctly puts this point across by stating that, \u201cWe should trust less in the digital world\u2026 cybersecurity isn\u2019t merely an IT problem, it needs to be embraced from the top down to the bottom levels of an organisation.\u201d<sup>18<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Update your policies concerning privacy and cybersecurity<\/strong><\/h3>\n\n\n\n<p>Are your privacy and security policies up-to-date? Most businesses outsource services or products to third parties and it\u2019s important to ensure those third parties are following your privacy and security policies if they have access to your internal software and servers.<sup>19<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Change your passwords regularly<\/strong><\/h3>\n\n\n\n<p>Using one password or even one password with slight variations is risky. The problem with changing your password often is that you may not remember all the passwords. An easy method to circumvent this is by using a password manager that can assist with password generation and logging into your accounts.<sup>20<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>7. Be smart about sharing personal information<\/strong><\/h3>\n\n\n\n<p>Phishing is exactly what the name sounds like. Cybercriminals are fishing, hoping that with the right bait, you\u2019ll be caught \u2013 hook, line and sinker.<sup>21<\/sup> Phishing often resembles emails that ask you to reset your password or account information through an infected link. The email is supposed to represent a legitimate company, containing their branding and email style. Usually, small details on the email will help you to detect if this is a genuine email from that company or not. Phishing has also evolved into \u201cwhaling\u201d \u2013 where top-tier people in the organisation are targeted to steal company-sensitive information.<sup>22<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>8. Understand that your Internet of Things (IoT) devices have poor security<\/strong><\/h3>\n\n\n\n<p>You may not think your printer needs to be secure, but that seemingly innocuous object has been the focal point of many cyberattacks in recent years. According to Wired, \u201cA single open port on a network connected printer is all a sophisticated malware attack needs to infect a network, send copies of itself to other connected devices and potentially seize confidential data.\u201d<sup>23<\/sup><\/p>\n\n\n\n<p>Be more aware of your connected devices \u2013 every device is a potential backdoor that a hacker can use to infiltrate your organisation. These include: USBs, CCTV cameras, routers and printers. Most of these devices are made to connect to your security network, and have security features. The cost of overlooking cybersecurity for your IoT devices can run into millions, and simply using these features may mitigate the severity of a cyberattack quite drastically.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>9. Lock your phone or laptop when unattended<\/strong><\/h3>\n\n\n\n<p>The danger of leaving your device unattended with all your information readily available, especially in public or workspaces isn\u2019t worth the risk. Always lock your devices if you leave their vicinity.<sup>25<\/sup><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>10. Be careful of free WiFi<\/strong><\/h3>\n\n\n\n<p>Criminals can use this as an entry point into your devices and steal your personal data.<sup>26<\/sup> Most publicly accessible WiFi spots require you to login to use the free WiFi. Malware such as keyloggers or spyware can then be downloaded onto your mobile or the electronic device you\u2019re using. From this, hackers can gain access to your private information. On top of being generally wary of free WiFi, it\u2019s also a good idea to ensure you have anti-virus software installed on your devices.<\/p>\n\n\n\n<p>Cybersecurity professionals play a vital role in identifying threats and protecting online data. As the world becomes increasingly more reliant on digital spaces, cybersecurity professionals need to be more proactive in preventing cybercrime. Become your own firewall to aid in the fight against cybercrime. Laziness and ignorance are weaknesses that cybercriminals rely on to exploit digital vulnerabilities. The future of cybersecurity rests upon humans being savvy enough to control access to their private information.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>1<\/sup> Armstrong, S. (Sept, 2017). \u2018Stay safe online: Experts reveal 10 ways to protect yourself and your business from hackers\u2019. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/wired-security-event\" target=\"_blank\" rel=\"noopener\">Wired.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>2<\/sup> (2017). \u2018Cost of cyber crime study: Insights on the security investments that make a difference\u2019. Retrieved from <a href=\"https:\/\/www.accenture.com\/t20170926T072837Z__w__\/us-en\/_acnmedia\/PDF-61\/Accenture-2017-CostCyberCrimeStudy.pdf\" target=\"_blank\" rel=\"noopener\">Accenture.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>3<\/sup> (2018). \u2018Cybersecurity. Get the full picture\u2019. Retrieved from <a href=\"https:\/\/www.cisco.com\/c\/m\/en_emear\/campaigns\/security\/cyber-threats-and-protection-2018-report\/index.html\" target=\"_blank\" rel=\"noopener\">Cisco Systems.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>4<\/sup> Adnan, A., Nicholson, M., Stevenson, C., and Douglas, A. (2016). \u2018From security monitoring to cyber risk monitoring\u2019. Retrieved from <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/insights\/us\/articles\/future-of-cybersecurity-operations-management\/DR19_FromSecurityMonitoringToCyberRiskMonitoring.pdf\" target=\"_blank\" rel=\"noopener\">Deloitte.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>5<\/sup> Nohe, P. (Aug, 2018). \u2018How to perform a cyber risk assessment\u2019. Retrieved from <a href=\"https:\/\/www.thesslstore.com\/blog\/cyber-risk-assessment\/\" target=\"_blank\" rel=\"noopener\">Hashed Out.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>6<\/sup> Nohe, P. (Aug, 2018). \u2018How to perform a cyber risk assessment\u2019. Retrieved from <a href=\"https:\/\/www.thesslstore.com\/blog\/cyber-risk-assessment\/\" target=\"_blank\" rel=\"noopener\">Hashed Out.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>7<\/sup> Viuker, S. (Jan, 2015). \u2018Cybercrime and hacking are even bigger worries for small business owners\u2019. Retrieved from <a href=\"https:\/\/www.theguardian.com\/business\/2015\/jan\/21\/cybersecurity-small-business-thwarting-hackers-obama-cameron\" target=\"_blank\" rel=\"noopener\">The Guardian.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>8<\/sup> Nohe, P. (Aug, 2018). \u2018How to perform a cyber risk assessment\u2019. Retrieved from <a href=\"https:\/\/www.thesslstore.com\/blog\/cyber-risk-assessment\/\" target=\"_blank\" rel=\"noopener\">Hashed Out.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>9<\/sup> Blau, A. (Dec, 2017). \u2018Better cybersecurity starts with fixing your employees\u2019 bad habits\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2017\/12\/better-cybersecurity-starts-with-fixing-your-employees-bad-habits\" target=\"_blank\" rel=\"noopener\">Harvard Business Review.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>10<\/sup> Viuker, S. (Jan, 2015). \u2018Cybercrime and hacking are even bigger worries for small business owners\u2019. Retrieved from <a href=\"https:\/\/www.theguardian.com\/business\/2015\/jan\/21\/cybersecurity-small-business-thwarting-hackers-obama-cameron\" target=\"_blank\" rel=\"noopener\">The Guardian.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>11<\/sup> Sulmeyer, M., and Dugas, M. (Nov, 2017). \u2018More training won\u2019t reduce your cyber risk\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2017\/11\/more-training-wont-reduce-your-cyber-risk#comment-section\" target=\"_blank\" rel=\"noopener\">Harvard Business Review<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>12<\/sup> Newman, L. (Sep, 2016). \u2018Time to kill security questions &#8211; or answer them with lies\u2019. Retrieved from<a href=\"https:\/\/www.wired.com\/2016\/09\/time-kill-security-questions-answer-lies\/\" target=\"_blank\" rel=\"noopener\">Wired.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>13<\/sup> Hlavaty, C. (Mar, 2018). \u2018That Facebook quiz is probably stealing your personal information\u2019. Retrieved from <a href=\"https:\/\/www.chron.com\/g00\/national\/article\/That-Facebook-quiz-is-probably-stealing-your-12781756.php?i10c.encReferrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvLnphLw%3d%3d&amp;i10c.ua=1&amp;i10c.dv=14\" target=\"_blank\" rel=\"noopener\">Houston Chronicle.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>14<\/sup> Carlton Collins, J. (Mar, 2018). \u2018Online security: The password-recovery questions you should be answering\u2019. Retrieved from<\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>15<\/sup> Blau, A. (Dec, 2017). \u2018Better cybersecurity starts with fixing your employees\u2019 bad habits\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2017\/12\/better-cybersecurity-starts-with-fixing-your-employees-bad-habits\" target=\"_blank\" rel=\"noopener\">Harvard Business Review.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>16<\/sup> May, R. (Nov, 2017). \u2018Your Human Firewall \u2013 The answer to the cybersecurity problem.\u2019 Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8\" target=\"_blank\" rel=\"noopener\">TEDx.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>17<\/sup> Cisco, the University of Technology Sydney and the Australian Mathematical Sciences Institute. (Feb, 2018). \u2018Six habits of cyber resilient boards\u2019. Retrieved from <a href=\"https:\/\/issuu.com\/jenspistorius\/docs\/six_habits_of_cyber_resilient_board\" target=\"_blank\" rel=\"noopener\">ISSUU.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>18<\/sup> May, R. (Nov, 2017). \u2018Your Human Firewall \u2013 The answer to the cybersecurity problem\u2019. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8\" target=\"_blank\" rel=\"noopener\">TEDx.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>19<\/sup> Blau, A. (Dec, 2017). \u2018Better cybersecurity starts with fixing your employees\u2019 bad habits\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2017\/12\/better-cybersecurity-starts-with-fixing-your-employees-bad-habits\" target=\"_blank\" rel=\"noopener\">Harvard Business Review<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>20<\/sup> (Nov, 2016). \u201810 Workplace cyber security tips\u2019. Retrieved from <a href=\"https:\/\/fbsbenefits.com\/resources\/fbs-blog\/10-ways-boost-cyber-security\/\" target=\"_blank\" rel=\"noopener\">FBS.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>21<\/sup> Lohrmann, D. (May, 2016). \u2018Beyond spear phishing: how to address whaling and more\u2019. Retrieved from <a href=\"http:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/beyond-spear-phishing-how-to-address-whaling-and-more.html\" target=\"_blank\" rel=\"noopener\">Government Technology.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>22<\/sup> Lohrmann, D. (May, 2016). \u2018Beyond spear phishing: how to address whaling and more\u2019. Retrieved from <a href=\"http:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/beyond-spear-phishing-how-to-address-whaling-and-more.html\" target=\"_blank\" rel=\"noopener\">Government Technology.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>23<\/sup> (Feb, 2017). \u2018The Internet of Things has a dark side. Here&#8217;s how to protect yourself\u2019. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/hp-re-inventors-protect-your-business\" target=\"_blank\" rel=\"noopener\">Wired.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>24<\/sup> (Feb, 2017). \u2018The Internet of Things has a dark side. Here&#8217;s how to protect yourself\u2019. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/hp-re-inventors-protect-your-business\" target=\"_blank\" rel=\"noopener\">Wired.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>25<\/sup> Phelps, T. (Sep, 2017). \u2018Why you should always lock your computer\u2019. Retrieved from <a href=\"http:\/\/www.netstandard.com\/always-lock-computer\/\" target=\"_blank\" rel=\"noopener\">Net Standard.<\/a><\/li>\n<li class=\"mb-4\"><sup>26<\/sup> Dockrill, P. (Feb, 2016). \u2018Here\u2019s why you should be careful about using public Wi-Fi hotspots\u2019. Retrieved from <a href=\"https:\/\/www.sciencealert.com\/here-s-why-you-should-be-careful-about-using-public-wi-fi-hotspots\" target=\"_blank\" rel=\"noopener\">Science Alert.<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity experts are often asked for advice on why cybersecurity is needed. Modern security means not only ensuring that you are physically safe and protecting your assets, but also includes the safety of your digital security and assets. Think about where you are the most vulnerable, and let that sink in for a moment. What [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":21012,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[122,120],"article-format":[],"class_list":["post-21010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-business-management","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Be Defensive: What Cybersecurity Experts Do (and Why it Matters) - GetSmarter Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Be Defensive: What Cybersecurity Experts Do (and Why it Matters)\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity experts are often asked for advice on why cybersecurity is needed. Modern security means not only ensuring that you are physically safe and protecting your assets, but also includes the safety of your digital security and assets. Think about where you are the most vulnerable, and let that sink in for a moment. What [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-28T09:04:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T09:32:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/#primaryimage\",\"url\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg\",\"contentUrl\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg\",\"width\":360,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.getsmarter.com\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Be Defensive: What Cybersecurity Experts Do (and Why it Matters) - GetSmarter Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/","og_locale":"en_US","og_type":"article","og_title":"Be Defensive: What Cybersecurity Experts Do (and Why it Matters)","og_description":"Cybersecurity experts are often asked for advice on why cybersecurity is needed. Modern security means not only ensuring that you are physically safe and protecting your assets, but also includes the safety of your digital security and assets. Think about where you are the most vulnerable, and let that sink in for a moment. What [&hellip;]","og_url":"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/","og_site_name":"GetSmarter Blog","article_published_time":"2018-11-28T09:04:37+00:00","article_modified_time":"2023-08-08T09:32:41+00:00","og_image":[{"width":360,"height":200,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/SLOT-04-Q4_Article-header-images_mobile_360x200px.jpg","width":360,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/be-defensive-what-cybersecurity-experts-do-and-why-it-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/21010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=21010"}],"version-history":[{"count":53,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/21010\/revisions"}],"predecessor-version":[{"id":50214,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/21010\/revisions\/50214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/21012"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=21010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=21010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=21010"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=21010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}