All Hacks Lead To EMAIL. Here Is Why.
The Donald Allen Cybersecurity Letter available for FREE right NOW... Sign-up at dacybersecurity.com

All Hacks Lead To EMAIL. Here Is Why.

"All hacks lead to Email. Here is why." by Donald Allen, dacybersecurity.com.

"Some people learn by doing. Others have to be taught. In the long run, all roads lead to Rome."

Haven’t you heard about this proverb?

Perhaps, you’ve heard about this one:

"All Roads Lead to Rome."

Well, though, they differ in spelling, they are similar in concept.

And before I go into the details on how this proverb has to do with cybersecurity, let’s examine the statement first:

Did All Roads Really Lead To Rome?

In fact, they did.

This ancient saying is based on the fact that Rome was the point of convergence of all the main roads of the Roman Empire.

Back then the road system was formed more of a grid pattern to link regional cities. Important cities, in contrast, were joined to other cities by the pattern of roads, which was somewhat of a wheel and spoke.

Since then, this phrase refers to the times when Rome was positioned in the center, with every road attached to it.

The "All roads lead to Rome" proverb simply means that you can approach the puzzle any way you like, as long as you solve it.

In other words, there are many different routes to the same goal.

Same With Data Breaches

There are a lot of ways to get your data.

Yet, still, all hacks lead to Email.

There is a reason why 9 out of 10 successful data breaches start with Email.

After almost 100 hours of interviews with the world's finest cybersecurity professionals, I can finally tell you what it is. Ready?

People.

You see, there are two types of people: untrained and cyber conditioned.

So as two different types of companies: unsecured and secured.

By choosing the first "road" -untrained- you’re putting your and your company's sensitive information under the huge risk.

Because there are many Internet threats out there, like man-in-the-middle, phishing, social engineers’ techniques, traffic analysis, domain spoofing, and so on.

That's why it's mucha importante to educate everyone you know on the Cyber-Hygiene Essentials.

Chuck Brooks' Article "Cyber-Hygiene Essentials" Can Help:

https://dacybersecurity.com/blog/cyber-hygiene-essentials/

You'll discover ideas on how to explain Cyber-Hygiene principles to others, along with the 9-Step Cyber-Hygiene Mantra to live by.

Remember:

"Cybersecurity is not a technological problem, it's a human problem."

Help me and Charles to spread the word. 

Kindly, share the Cyber-Hygiene Essentials article with your network.

After you do, drop me a line with the link to your post about it and I will send you a special gift. 

Securelicious,

Donald Allen

dacybersecurity.com

Twitter: https://twitter.com/realdonaldallen

LinkedIn: https://www.dhirubhai.net/in/realdonaldallen

FREE Daily Cybersecurity Tips: https://dacybersecurity.com

Giovanni Hellings CISM

Information Security | Risk Management | Cyber Resilience | Coach | Trainer

5 年

Great article.

Encrypt MD

"IT Cloud & Cyber Security Provider"

5 年

Your summery is perfect "people" every time it's the human element and without training cyber threats cannot be stopped. Great article

回复

Hi Donald, nice write-up! However, I have to disagree with you. Almost all hacks lead to email, you say it yourself - 9/10 hacks are via email. Probably higher than 90% IMHO. Here are few big ones not via email: 1.? Target - HVAC 2.? Equifax - Consumer Complaint Web Portal 3.? Dubmash & Others - Database 4.? Marriott - RAT 5.? Heartland, Global Payment Card Systems/Solutions, TJ Max, and other - PCI SQL Injection And yes, the biggest data breach ever - Yahoo! - was indeed caused by email spear phishing! My 2 cents.

Tom Hutchins

Business Development Director, LexisNexis Risk Solutions | Helping customers prevent fraud and fight financial crimes

5 年

"Cybersecurity is not a technological problem, it's a human problem" - never has a more relevant phrase been spoken in the age of digitization and the risks that come with it.

Guy Horesh Gunin ??

Cybersecurity Strategist | Identity & Application Security Expert | Pre-Sales Engineer | Cultivating Relationships with Cybersecurity Vendor Partners ?? | Mitigating Risks with Tailored Solutions ???

5 年

email is probably the most hacker-friendly way to deliver hacker\malware payloads there for it been used in so many.

要查看或添加评论,请登录

?? Donald Allen ????的更多文章

社区洞察

其他会员也浏览了