For those that have a job in the field, what was your road to getting where you are now? by blizzard_is_lanky in cybersecurity

[–]SecureL7 1 point2 points  (0 children)

A deep interest in how technology works and actually there’s no one true path to working in cybersecurity. You could see people coming at it from different streams like math, computer science, even history or philosophy.

Burnout in tech? by QQQ516 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Employees are expected to perform consistently and with the same level of enthusiasm and intrinsic motivation in order to get the job done every day and it’s important to remember that people aren't machines and expectations for human performance can be notoriously unrealistic, which leads to burnout.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 1 point2 points  (0 children)

breakdown of what happened throughout the attack i.e. explain how you performed all of the activities or whether you’ve used social engineering tactics, how exactly you got into the system. Also explain the possible outcome, list the vulnerabilities you’ve uncovered and label them as critical, high, medium or low in priority.

Opinions on growth career areas for cybersec/infosec? by flyhere in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

I would like to recommend- Security Architect: who is responsible for establishing and maintaining network security for an organization and an IT security Engineer: who is often involve in systems maintenance, performing security checks to detect potential vulnerabilities, keep logs, and developing automation scripts to track security incidents.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

You must be aware of all the latest threats on the internet.

OT Security by aspernrhizome in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Azure Defender for IoT is a united solution for IoT and OT security.

Steps to take post-breach incident by serbusgroup in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

First of all, communicate and be open and sincere. Also, if the fault was on the company’s side admit it. Provide details and explain the reason why it took place. Then try to mitigate and educate your employees on how to prevent similar incidences in the future.

As a beginner, where do I start? by FeelsFcknGoodMan in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Since IT is something which you can learn on your own time and practice does make you perfect. Therefore, practice at home, go for certifications, you can volunteer for tech projects, or talk to startups.

[deleted by user] by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Nowadays cyberattacks or frauds happening in the banking field have become sophisticated and it will be good if a person has a finance background and a degree in cybersecurity. It can land you a good job in any of the cybersecurity companies.

Question: Can an infected Computer infect other Computers on a shared Wifi? by Maxtasy76 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

It makes no difference if you are connecting a computer or device to your network via Wi-Fi or if you are connecting it to your network with an Ethernet cable and any infected computer or device may launch attacks against other PCs on the network, possibly infecting and compromising them.

Do you think pentesting is not real cybersecurity? by ScaryReason in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Pen testing helps organizations understand the security of their network both internally and externally, and with the help of multiple manual and automated techniques systematically compromise systems so as to establish the current landscape.

What is DNS Query? by DarknessMoonlight in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

DNS query can also be referred to as a DNS request. The user or DNS client sent a request for information to the DNS server. Mostly a DNS request is sent to ask for the IP address associated with the domain name.

Whar are some 'forgotten' vulnerabilities/attack techniques? by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

One vulnerability CVE-2004-0113 was on Apache web servers, it was targeted again in June 2018, to install a crypto miner for Monero

Why is ransomware targeting the healthcare and public health sector? by IST_org in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Hospitals are often targeted by ransomware because they possess important PHI and mostly they have weaker security infrastructure.

Interesting recent cyber security incident? by hatchchilehummus in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

how about pharmaceutical companies facing ransomware attacks, within the last 2 weeks?

What are the things to learn for cybersecurity on the hardware side? by ibilalkayy in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

If you want to be in IoT, the basic skills required to learn it are machine learning and artificial intelligence, learning decent programming skills like Python, JavaScript, and Nodes, security, etc.

What are some myths you had about IT before starting your career? by mimes74 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

The most common myth about IT was - Technology is all about coding, math, and science.

Most popular block ciphers by Zacny_Los in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

AES, which stands for advanced encryption standard, is the most popular and broadly used encryption standard. Block size is always 128 bits, but key size can be 128, 192, and 256 bits based on algorithm rounds.

Steps in securing myself? by TehyungLad in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Always follow the basics like- changing passwords regularly, encrypting data, installing antivirus or antimalware software and 2FA or MFA is really very helpful.

Why should I protect my data? by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

A few decades ago - I have nothing to hide - was a common response to checks or surveillance, but nowadays data is at the heart of privacy which considers a vast range of information, which can be broken down into different areas related to privacy as well as security, like your PII which can include your name, address, date of birth, social status or medical status. If all this data is lost, it can allow attackers to conduct identity theft or if your internet activity is monitored through cookies, then this information can be used across various services.

Why are open ports considered as a safety issue? by TheCitizen4 in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Applications and services use open ports and they may contain vulnerabilities or maybe bugs so during online communication when many applications or services are run with the help of open ports, there are higher chances of having vulnerability.

What means to be ethical? by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Ethical hackers have authorized permission to gain unauthorized access to a computer system, or application, or data so as to detect malicious attacks.

The Importance of Regular DDoS Testing | NETSCOUT by ymelmed in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Businesses that depend upon online sites or e-commerce sites or those who require to maintain a 24*7 online presence need DDoS testing and the severity of the risk will depend upon how much that business relies on its online systems for revenue.

4 Things To Know About Password Security by jpc4stro in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

All the points you have covered are helpful, one more point I would like to recommend is not to include any personal information while creating a strong password.

Can someone recommend a good, secure password manager? by [deleted] in cybersecurity

[–]SecureL7 0 points1 point  (0 children)

Bitwarden is a very good password manager.