Cyber Security – Back to the Basics

Simplifying Cyber Security

The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use multiple products that all do the same thing, which in turn interferes with each one’s functionality.

In an attempt to make your life easier, PC Matic wants to go back to the basics for a moment.  First, let’s talk about the two types of intrusions. 

  • Malicious software is running on your device
  • An unauthorized person is on your device or within your network without your permission.

That’s it.  Two types of intrusions, people or software.

Next, let’s simplify how to block these two intruders.  It’s quite simple but has become a convoluted concept. To block these intruders you must secure your devices. How do you do that? Only permit known trusted programs to execute. This method, known as application whitelisting blocks any file or software that tries to run on the device that has not been proven secure.

In theory, this is the same method of security you likely use for your home.  You keep your doors locked, only allowing those you trust inside.  From an IT perspective, you keep your device locked, only allowing known, trusted programs or files to run. 

Moving Forward…

Over the last few years, attack vectors have continued to evolve.  The two intrusions remain the same — people and software, but how they get into your system has advanced.

Therefore, hackers are going outside of file-based attacks and worming their way into your devices through other methods such as fileless infections and remote desktop attacks.  Finding a security solution that effectively thwarts all forms of attack vectors is imperative.  This proves the security solution is evolving with security threats.

If your security solution isn’t thwarting all attack vectors, then it’s time for a change.

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles