HOW TO STAY UP TO DATE WITH CYBERSECURITY
HOW TO STAY UP TO DATE WITH CYBERSECURITY
As we kick off National Cybersecurity Awareness Month, it seems only right to talk about how to remain on top of contemporary cybersecurity and privacy advances. What is the greatest method to keep safe? How do you tell whether something is a scam? Which major corporation has recently been breached?
Because of the current condition of circumstances, the issue of security is extensively discussed across numerous businesses, blogs, and news channels. Every day, it seems, we learn of a new significant data breach affecting thousands, if not millions, of people. No one is protected, from shops like Target to social networking sites like Facebook to larger credit bureaus like Equifax.
The uncontrollable nature of assaults, along with the 24-hour news cycle, makes it nearly impossible to keep up with all of the cybersecurity information being thrown at us. Many people are suffering security weariness because of the frequent revelations of new assaults, data breaches, system failures, and virus use. We’re all sick and tired of hearing about it, and honestly, we’re disappointed in many firms and individuals that consistently fail to secure the data for which they are accountable.
Whether we’re tired or not, we can’t afford to overlook what’s going on in cybersecurity right now. We all have a responsibility to safeguard not just ourselves, but also our communities, countries, and the entire planet by being informed. You can help by keeping your knowledge up to date and using a few basic tactics to catch the good information and filter out the bad.
1. Pay attention to security specialists and influencers.
We live in the information era, when knowledge is digitally captured and broadcast for eternity, kept on massive servers, and accessible by typing a search query into a search engine. You may learn new things and broaden your knowledge in several ways, depending on your preferences.
You may, for example, get information from more traditional sources such as news websites and blogs from security professionals. but you can also use social media, attend webinars and conferences, or connect directly with someone knowledgeable in the subject.
You could even bring it up at the office water cooler or when making small talk with parents at your child’s school—cybersecurity is getting so much attention in the media these days that it’s become material for popular conversation. Many people will gladly talk about something other than the most recent breach, maybe sparking a conversation about which security solution is the best or suggesting methods to defend oneself from an attack.
Whatever path you take, you’ll want to follow some of the top security experts for the finest advice. Some of my favorites are:
Bruce Schneier
Krebs, Brian
TaoSecurity by Richard Bejtlich
Rubinoff, Shira
Magdalena Chelly
2. Look through security-related social media issues.
Most social media networks are excellent sites for finding extra material, such as real-world news pieces, videos, views, and other posts. They also include a wealth of additional information about local, national, and worldwide events, employment possibilities, top cybersecurity firms, and much more. Of course, social media isn’t the only source of information you’ll want to use, but it may supplement some of the other outlets on this list.
Twitter is particularly valuable if you know what trends and hashtags to look for, as well as who to follow. It allows you to view real-time debates about current events, so you can be right there, at the moment, when things happen.
Twitter lists may also be used to create a specialized content stream. You may define which security firms, influencers, and developers you want to include in your list (or lists), and Tweets will be filtered accordingly. Lists provide the extra benefit of filtering out the noise that is irrelevant to a certain group—you may narrow your attention to a single topic or community.
3. Attend live events
There is a sizable demand for live, in-person cybersecurity events, believe it or not. This encompasses far more than conferences, or “cons.” You might also go to lectures, seminars, workshops, networking events, educational courses, or sponsored meet-ups.
Web-based activities, such as webinars and online community conference calls, are another excellent option. Some of the top live cybersecurity speakers will attend or be requested to participate in such events, and it stands to reason that you may learn a lot from any of them.
So, how can you locate such events? You must be aware of when, where, and what is going on around you. Local newspapers are excellent sources of event information. And, of course, there’s always good old Google. Fortunately, several of the other networks suggested in this post will also assist you in staying updated.
4. Examine the vulnerability and risk advisory streams.
It is impossible to overestimate the importance of being informed on security flaws revealed in both new and old technology, especially for company owners. Web browsers, applications, software, operating systems, and other personal or professional tools you use might have been hacked or attacked.
To guarantee the security of your personal and business data, you should make it a practice to monitor vulnerability alert feeds and advisory sites regularly.
Here’s a basic rundown:
Have I Been Pwned?
US-CERT is an abbreviation for the United States Computer Emergency Readiness Team.
SecurityFocus
The National Vulnerability Database (NVD)
SecLists.org or Full Disclosure
Internet Storm Center (SANS)
If checking these streams daily is too time-consuming, another option is to simply keep your programs updated at all times, eliminating the possibility of a cybercriminal exploiting the vulnerability and gaining access to your laptop.
5. Tune in to a podcast
We all lead busy lives, and it’s possible that you don’t have time to read article after article. But what about your time spent driving, walking, or traveling? Podcasts are ideal for filling this time because they can be listened to while on the road and while multitasking.
Podcasts may be accessed and listened to via a multitude of methods, such as media applications, music libraries like iTunes or Spotify, Amazon, or even YouTube.
6. Create your real-time notifications.
You may build up bespoke cybersecurity warnings using a platform like IFTTT, which stands for If This Then That.
For example, the subreddit r/netsec is one of the most popular curated forums for cybersecurity news and information. You may set up IFTTT to give you push notifications or emails when anything on the subreddit gets popular. The headlines will appear on your mobile device’s taskbar, allowing you to decide whether or not the story is worth your time.
Of all, the r/netsec example is only one of many. You may customize any reputable sites or community forums to deliver you RSS feed notifications as you see fit.
UK Cyber Security Group Ltd is here to help
Please check out our Cyber Essentials Checklist
Please check out our Free Cyber Insurance
If you would like to know more, do get in touch as we are happy to answer any questions. Looking to improve your cybersecurity but not sure where to start? Begin by getting certified in Cyber Essentials, the UK government’s scheme that covers all the technical controls that will provide the protection that you need to help guard against criminal attacks. Or just get in touch by clicking contact us