I marvel at the way the IT experts are constantly monitoring cyberspace for viruses, malware, and other evil bits of code.  As soon as they identify a threat, the counter tactics begin.  This usually results in regular users being prompted to perform a software update or seamlessly experiencing a software update.

The bad news is the war never ends.  The good news is it seems we are getting better at waging the war.

Unfortunately, no matter how knowledgeable and skilled our IT experts become, in many threat situations the weak link is the user.  Someone clicks on a link, visits a Web site, or falls for a social-engineering email and thereby downloads a malevolent EXE file.  Then, disaster happens.

I think our IT safety nets and measures are terrific.  Nevertheless, I do not blindly assume they will always work.  Furthermore, I never assume I will always get it right in cyberspace.  As Benjamin Wallace once said (“Scare Tactics” Wired, October 2011, p. 120):

“That’s the insidious thing about social engineering:  There isn’t any patch to fix the system threats in our gullible brains.”

Our gullible brains indeed are what we must monitor most closely if we want to remain safe in cyberspace.  I hear that works in real space too.

scrolling=”no” frameborder=”0″
style=”border:none; width:450px; height:80px”>

About James Meadows

Currently I serve as a training team manager for Tyco Integrated Security at a customer-care center in Kansas City. Additionally, I am a business consultant, a freelance corporate writer, an Assembly of God ordained minister, a Civil Air Patrol chaplain, a blogger, and a University of Phoenix Associate Faculty member. I believe we are living in the most fascinating times of human history. To maximize the opportunities these times present, I have a passionate interest in leadership development and organizational success, both of which I view as inextricably linked.

Leave a Reply