I marvel at the way the IT experts are constantly monitoring cyberspace for viruses, malware, and other evil bits of code. As soon as they identify a threat, the counter tactics begin. This usually results in regular users being prompted to perform a software update or seamlessly experiencing a software update.
The bad news is the war never ends. The good news is it seems we are getting better at waging the war.
Unfortunately, no matter how knowledgeable and skilled our IT experts become, in many threat situations the weak link is the user. Someone clicks on a link, visits a Web site, or falls for a social-engineering email and thereby downloads a malevolent EXE file. Then, disaster happens.
I think our IT safety nets and measures are terrific. Nevertheless, I do not blindly assume they will always work. Furthermore, I never assume I will always get it right in cyberspace. As Benjamin Wallace once said (“Scare Tactics” Wired, October 2011, p. 120):
“That’s the insidious thing about social engineering: There isn’t any patch to fix the system threats in our gullible brains.”
Our gullible brains indeed are what we must monitor most closely if we want to remain safe in cyberspace. I hear that works in real space too.
style=”border:none; width:450px; height:80px”>