The Basics, As I Understand It

So, you're curious about cybersecurity

The pace at which the world's technology has been accelerating is making it incredibly difficult to keep up lately. This is generally fine, since we are mostly end users of such technology, and so the tech like your smartphone or TV, are most likely already as user-friendly as possible. But while we are enjoying the fruits of technological developments, for a cybersecurity professional like me, the world is actually becoming a scarier place. By the end of this, you'll understand why cybersecurity is your problem too, and why it always has been.

Let's start with a simple exercise. Below is a password strength checker. While nothing you input below is sent anywhere, in case you're skeptical, just try putting famously simple passwords like "123456" or the ever-classic "password".

// Local password check

Try a Password

Your password is checked only in this browser. It is never sent anywhere.

No password entered
Estimated crack time: β€”
12 or more characters
Lowercase letter
Uppercase letter
Number
Symbol
Not a common password

Strength estimation powered by zxcvbn, originally authored by Dan Wheeler at Dropbox and released under the MIT License.

Did you notice how quickly a modern computer can crack these?

Next, let's do another simple exercise; visit the website I've linked below in a new tab, and paste your email there (don't worry, it's safe!), and observe the results for yourself:

So, what did you learn? If your page said 0 breaches, you're either so new to the internet that your email has barely made the rounds, or your cyber hygiene is already just that good. If it's the latter, well done!

However, if it said otherwise, and you're learning about those breaches for the first time, it's probably a good time to start changing passwords to those breached accounts as soon as possible.

I also highly recommend you go through the well-documented Have I Been Pwned: Frequently Asked Questions to learn more! I am a huge fan of this service.

However, long before the digital age, the need to protect sensitive information has been a constant human concern. Let's take a short journey through the decades to see how this has evolved.

// Timeline

A Short History of Cybersecurity

Ancient world

Medieval & early modern

Industrial era

Decade by decade

So, how much does this affect me?

Well, I hate to break it to you, but cybersecurity has always been and continues to be every individual's responsibility; yes, that includes you! It's genuinely unnerving the lengths some adversaries will go to in order to break into systems.

Human beings remain the weakest link in cybersecurity, whether we're talking about everyday individuals or the security teams at the world's largest companies.

  • According to recent data, the human element is the root cause of 74% to 95% of data breaches.
  • Back in 2020, over 130 high-profile X/twitter accounts, like those belonging to Barack Obama, Bill Gates and more were taken over as a result of a breach at X/Twitter. This was the result of something called "social engineering" - more specifically "vishing", which sounds fancy, but all it meant was that the attackers posed as the twitter IT team and called its employees, and convinced them to hand over their credentials.
  • Even IT teams make costly mistakes. In 2017, the Equifax team failed to apply a known patch to their web framework, and it eventually remained an open door for the attacker to exploit. This eventually led to 148 million people's personal data being stolen, close to $700 million in fines and settlements, and a drop in their market cap by $5 billion. All in all, including recovery, implementing better security and more, it cost them upwards of $1.8 billion. Even worse, no amount of compensation can undo loss of personal data.

Conclusion

Cybersecurity has been a human problem since long before computers existed; it's just that the stakes are considerably higher now. If this has sparked your curiosity, I'll cover practical steps you can take to protect your digital life in the next article. Thanks for reading!


Image credit: Pete Linforth

References and further reading: