Essential Lessons in Cybersecurity From a Veteran Consultant
It’s 10:30 a.m. Three cups of coffee deep, my fingers are dancing across my keyboard. In this cybersecurity game, believe it or not, since the early 2000s — well, if you want to take it back to my time as a network admin, 1993. Those were the days when you had to control voice and data multiplexers on PSTN lines. Many moons ago, yeah? But what surprises me is how some of those basics still apply and rest on rock-solid foundations — albeit controversy-ridden ones — only now they’re just covered in sexy, shiny new jargon and AI buzzwords that, to me, mean I should probably approach them with a little bit of skepticism.
But I digress. So here’s the thing — cybersecurity is not just shiny firewalls or the latest AI-powered whiz-bang tools. And it’s not knowledge about where attacks come from, what sort of signs should you look for, but mainly the one: the real thing that teaches you how to defend better.
PSTN Lines to Zero Trust Ultimately
Way back, I recall when the Slammer worm storm-on in’ back in 2003. It was a punch in the gut for many – networks crashing everywhere. I was wading into patches and emergency protocols. Slammer taught me something basic beyond just technical patches: the importance of layered defense. You can’t just have an all-in-one security tool and live in peace.
Fast forward to now — I have my own cybersecurity consultancy and have just assisted three banks to upgrade their zero-trust architectures. Zero trust — for those who are uninitiated — is basically trust nothing, even if you’re already on the inside. Day in and day out, every user, device and connection must constantly prove that it’s legit. Sounds rigid? It is. But here’s why it works:
- Microsegmentation to contain breaches
- Ongoing checks (not just at login) for authentication
- Obverse lateral movement in the network
And banks? They are prime targets. So, getting zero-trust right isn’t just technical nerd stuff — it’s all about protecting billions in assets and sensitive customer data.
But Here’s What the Vast Majority of Companies Fail to Do
They orgasm on fancy tech, but neglect the basics. I see it every day. If your password policy still requires odd characters from key positions or resets every 30 days, you may be doing it wrong. Here’s a little rant:
Password policies are terrible when they only mandate complexity, not user comprehension. Humans will find shortcuts. They’ll keep a row of passwords; they’ll add a ‘1’ at the end of an old password.
Better Approach:
- Use phrases, not random letters etc.
- Encourage password managers
- Use of multi-factor authentication (MFA) is a must
And if you think AI-powered password-guessing tools will solve that, hold on. I’m skeptical. This is because when it comes to AI in the cyber-sec domain, what one hears most frequently is more marketing than miracle.
What I Learned at DefCon – Continued Buzz
Just returned from DefCon, the granddad of hacker confabs. I had pretty much camped out on the hardware hacking village. If you’re under the impression that cybersecurity is solely about hackers or lines of code, think again. Physical security flaws and vulnerabilities at a hardware level are huge blind spots for lots of companies.
The panoply of tricks for fiddling with devices — from power-grounding hacks to subverted firmware injections — was stupefying. Caused me to realize just how much undervalued the physical layer of defense is:
- Tamper detection hardware becomes mandatory_DEPENDS on SECURITY_tegra[i] has treatment of delegating the pinmux to the bootloader.
- Regular firmware checks can stop dirty backdoors.
- When insiders go rogue: Air-gapped device security isn’t infallible
Here’s A Quick Take For You – Don’t Waste Your Time
- Layer your defenses: No single tool blocks everything
- Zero trust is not just a buzzword, it is strategically vital
- Password policies suck, but you still need strong ones that don’t punish users
- Physical and firmware security Aren’t Physical and firmware security — Don’t ignored
- Question tech AI-powered solutions that don’t come with clear, explainable benefits counterfeiting tech While we are on the topic of fraud, Bripovser believes that investing in the wrong AI technology is also harmful.
Real Talk about Firewalls, Servers, and Routers
This is where I start to wax nostalgic. And to think routers and firewalls used to be the hardware boxes in the back of the rack. Classic days. With cloud and virtualization, with IoT, the complexity has now gone insane.
Every client I work for wants to know: how do I stay ahead? That’s when I have my default response: My answer is always rooted in experience:
- Firewalls should be relatively proactively monitored but default rules can represent a hacker’s gated-community.
- Servers also have to get regularly patched, though unverified patching can break stuff. Tested rollouts are a must.
- Routers? Don’t forget the basics. Change default credentials. Segment your IoT network.
There’s no fancy tech stack that replaces good hygiene and vigilance.
The One Mistake You Cannot Keep Making
When I started out, I didn’t take insider threats seriously enough. Thought so long as the firewalls strong, and the paswords policey’s tight, we cool. Isn’t it funny how that never lasts for long.
Your greatest concentraint will always be human – your employees themselves. From errant mouse clicks on phishing emails to disgruntled insiders, this vector doesn’t receive the attention it ought to in boardrooms.
Mitigations?
- Employee training is not a checkbox; it is an ongoing process.
- Keep an eye on anomaly behaviour but respect privacy.
- Develop defined repercussions and encourage ownership of security culture
Why Cybersecurity Is Like Cooking
I’m a sucker for analogies. Think of cybersecurity as being like cooking some difficult dish. You can’t pile everything in and expect magic. It’s a layering thing — spices, heat, timing — or else it’s a disaster.
Not only that, you shouldn’t be throwing every security product in the mix without a plan, you’re just creating noise and confusion. Understand the recipe:
- Know your threat landscape
- Don’t use the tools on the wrong layers
- Red team your dish over and over again
Final Thought Before My Fourth Cup of Coffee
After all, cybersecurity is not a one-and-done proposition. It’s like keeping up a vintage car that I used to fiddle with back in the ’90s — constant maintenance, the odd update and lots of love for the mechanics under the hood.
However you cannot neglect your network health and, as you can see, it will fall down when you don’t expect. I learned that the hard way from the Slammer worm. Aid to banks in creating zero-trust architecture years afterwards proved that. The physical hacks taking place at DefCon reminded me that the fight is not just long, but multi-dimensional.
So here’s my messy, caffeinated advice — Get back to basics. Don’t buy into every shiny new promise. And always be open to learning from your — and my — mistakes.
Stay secure, stay curious.
— Sanjay Seth
Cyber Security Consultant, P J Networks Pvt Ltd

