DEV Community

Discussion on: Top 5 Cybersecurity Myth To Leave Behind In 2018

Collapse
 
tarialfaro profile image
Tari R. Alfaro • Edited

Thanks for bringing up these important topics! <3

  1. I do not recall anywhere saying or people claiming that small/medium sized businesses are immune to hacking. Could you cite any materials? But I get the general idea that the myth is small/medium businesses are not as much of a target as big businesses.

  2. What do you mean by "Strong Password Protection"? What's a myth about that? Sorry, just a little confused by the title used there. A way to solve this issue is with a diceware generated passphrase to protect a password manager such as KeePassXC or BitWarden.

  3. It is good to have firewalls and anti-virus software, I agree. However usually there are other defenses in place. Such as Intrusion Detection System (IDS) which is protecting against "moving around without being detected" issues. If you are running a website or anything related to file uploads, you can use the system command line to automatically use scanning tools against upload files and detect if they are malicious. This is actually very practical for images, like for profile pictures. A good defense is a firewall, anti-virus, IDS, automatic security updates and encrypted backups.

  4. Yes, it is excellent to teach your employees about information security best practices. I'll share a great article that was written on this very site.

  5. It is not known by "security through anonymity" and I do not think the word anonymity belongs there. Anonymity refers to individuals being indistinguishable, that is not the case here. Generally it's know as "security through obscurity". Overall, AVOID IT! It gives a false sense of security and buys you only a sliver of time, if at all. It can complicate things, and if things get complicated it becomes difficult to maintain security.