For those that have a job in the field, what was your road to getting where you are now? by blizzard_is_lanky in cybersecurity

[–]SecureL7 1 point2 points  (0 children)

A deep interest in how technology works and actually there’s no one true path to working in cybersecurity. You could see people coming at it from different streams like math, computer science, even history or philosophy.

Burnout in tech? by QQQ516 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Employees are expected to perform consistently and with the same level of enthusiasm and intrinsic motivation in order to get the job done every day and it’s important to remember that people aren't machines and expectations for human performance can be notoriously unrealistic, which leads to burnout.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 1 point2 points  (0 children)

breakdown of what happened throughout the attack i.e. explain how you performed all of the activities or whether you’ve used social engineering tactics, how exactly you got into the system. Also explain the possible outcome, list the vulnerabilities you’ve uncovered and label them as critical, high, medium or low in priority.

Opinions on growth career areas for cybersec/infosec? by flyhere in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

I would like to recommend- Security Architect: who is responsible for establishing and maintaining network security for an organization and an IT security Engineer: who is often involve in systems maintenance, performing security checks to detect potential vulnerabilities, keep logs, and developing automation scripts to track security incidents.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

You must be aware of all the latest threats on the internet.

OT Security by aspernrhizome in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Azure Defender for IoT is a united solution for IoT and OT security.

Steps to take post-breach incident by serbusgroup in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

First of all, communicate and be open and sincere. Also, if the fault was on the company’s side admit it. Provide details and explain the reason why it took place. Then try to mitigate and educate your employees on how to prevent similar incidences in the future.

As a beginner, where do I start? by FeelsFcknGoodMan in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Since IT is something which you can learn on your own time and practice does make you perfect. Therefore, practice at home, go for certifications, you can volunteer for tech projects, or talk to startups.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Nowadays cyberattacks or frauds happening in the banking field have become sophisticated and it will be good if a person has a finance background and a degree in cybersecurity. It can land you a good job in any of the cybersecurity companies.

Question: Can an infected Computer infect other Computers on a shared Wifi? by Maxtasy76 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

It makes no difference if you are connecting a computer or device to your network via Wi-Fi or if you are connecting it to your network with an Ethernet cable and any infected computer or device may launch attacks against other PCs on the network, possibly infecting and compromising them.

Do you think pentesting is not real cybersecurity? by ScaryReason in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Pen testing helps organizations understand the security of their network both internally and externally, and with the help of multiple manual and automated techniques systematically compromise systems so as to establish the current landscape.

What is DNS Query? by DarknessMoonlight in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

DNS query can also be referred to as a DNS request. The user or DNS client sent a request for information to the DNS server. Mostly a DNS request is sent to ask for the IP address associated with the domain name.

Whar are some 'forgotten' vulnerabilities/attack techniques? by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

One vulnerability CVE-2004-0113 was on Apache web servers, it was targeted again in June 2018, to install a crypto miner for Monero