The Security Measures Professionals Use To Prevent Being Attacked

Among cyber security experts, there are professionals who are more or less meticulous about their own security in the technological field. What seems clear is that a deeper understanding of the consequences of an action also leads them to be more aware of the dangers they may run and to take certain precautions. 

The human factor continues to be one of the entry vectors for cyber attacks on companies. Cyber security awareness also remains a pending subject for everyone, although users are increasingly aware of the dangers of the digital world and try to avoid them within their means. 

Safety Basics

There are several basic day-to-day protective measures used be cybersecurity experts:  

  • Authenticate, whenever the system allows it, with double authentication factor.  
  • Save credentials in password managers (never in the browser or elsewhere).
  • Encrypt the hard disk of all your computers.
  • Encrypt any item that is uploaded to the cloud (although it is not recommended to use this tool).
  • Use GPG (a system for encrypting files) for sensitive information transmitted by e-mail.
  • Use virtual machines and do not perform analysis on your own system.  
  • Always use a VPN.

An Old-Fashioned Telephone?

Although it is not the norm, in the world of hacking there are those who do not use smartphones, but prefer to use for old classic terminals. They are aware that in our pocket we not only carry a phone, but also a microphone, a database, a photo album that is updated every day, a camera that could be activated without the user's permission... Avoiding such exposure is essential for many even although it is not uncommon for anyone working in cyber security to have a smart phone in their hands.  

Reliable E-Mail 

Although it is no longer common for a hacker to set up his own email server, these types of professionals tend to value those platforms known to be more secure than the usual ones, especially recommended for sending personal documents, communicating with public entities or managing banking. 

They rely on anonymized services such as Protonmail or Tutanota. "They are technologies with a higher degree of confidentiality than those provided by larger companies, which offer private mail service without advertising, without automatic scanning of content. Of course, it is necessary to exercise trust, since 100% security does not exist, you always run some risk," explains Gonzalo Sánchez Delgado, Hacking Service Manager at Entelgy Innotec Security.

Instant Messaging On Another Level

Regarding social networks and instant messaging applications, as a general rule, security experts also tend to use the usual ones for the most trivial aspects.  "If you need to deal with something more private, you use alternatives such as Signal or private Discord servers... For normal conversations, encryption is widely used, although we know that nothing is completely secure," Delgado advises. 

Maintaining Anonymity

Iit is becoming increasingly common for cybersecurity experts to avoid uploading their own images to social networks and, if they do, they tend to cover their faces. "Because you don't know where something you share online is going to end up and you don't know how it's going to be used, especially with the evolution of generative Artificial Intelligence, this is being nipped in the bud," Delagado explains. 

Watermarks on Sensitive Documents

Have you ever wondered what might happen to the private information you have sent to an official entity when it suffers a cyberattack? Although it is not advisable to send sensitive information electronically, if it is mandatory to, for example, activate a service in a company, cyber security experts recommend using watermarks on documents to specify where they can be used and where not. This means, for example, specifying on a DNI that it can only be used for a specific purpose. "This way, if tomorrow your ID falls into the wrong hands and people try to register new services with it, it should not be able to be used," explains the Entelgy Innotec Security professional. 

Dedicated Computers & Routers For Different Uses

The vast majority of cyber security experts use one device for very private tasks (accessing online banking, handling crypto-currencies) and a different one for surfing the Internet, watching series. "Although in general the sector has relaxed a bit, we are not so paranoid, we now maintain a thread of connection with the outside," Delgado says.

Many of these professionals do not use the router provided by their Internet provider but have their own router secured so that no one can access their WiFi easily.

Under The Cloud 

"Having your most personal files in the cloud, such as your ID card, your photos or your tax return, is very unusual; people shy away from it. In the sector, having control of personal information is highly valued, and that means having custody of that information yourself" Delgado says. In this sense, few people use cloud-based photography platforms - which we all have almost by default on our cell phones.

Nothing Intelligent

Expert users also move away from all technology considered smart, such as speakers that listen to and record your voice and other household appliances or wearables that keep an almost complete record of a person's day-to-day life. "In all this technology, the problem of improper access to the information collected or directly a misuse of it, is known after some time, when little can be done... This is how we have learned of the biggest privacy scandals on the Internet months and even years later. For this reason, it is better to be cautious and avoid voice recordings or the general collection of information of any kind” Delgado says.

Parental Controls

Cyber security also involves children's devices. "I am not in favor of keeping children away from technology, but of educating them in its conscious use" explains Delgado. 

Among industry peers he says he sees how minors can have a console or tablet with parental controls and configured so that they can't make purchases, that no one can contact them. "Especially we know that the devices they use are not at all reliable, they can be easily compromised, so they are not used for other more important matters. Those tablets or smartphones are considered exclusively gaming devices."

Image: nattanan23

You Might Also Read: 

Critical Cyber Security Tips For Home & Family:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Finland Faces The Online Threat From Russia
Cyber Risk & Ransomware In 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.