Essential Lessons in Cybersecurity From a Veteran Consultant

It’s 10:30 a.m. Three cups of coffee deep, my fingers are dancing across my keyboard. In this cybersecurity game, believe it or not, since the early 2000s — well, if you want to take it back to my time as a network admin, 1993. Those were the days when you had to control voice and data multiplexers on PSTN lines. Many moons ago, yeah? But what surprises me is how some of those basics still apply and rest on rock-solid foundations — albeit controversy-ridden ones — only now they’re just covered in sexy, shiny new jargon and AI buzzwords that, to me, mean I should probably approach them with a little bit of skepticism.

But I digress. So here’s the thing — cybersecurity is not just shiny firewalls or the latest AI-powered whiz-bang tools. And it’s not knowledge about where attacks come from, what sort of signs should you look for, but mainly the one: the real thing that teaches you how to defend better.

PSTN Lines to Zero Trust Ultimately

Way back, I recall when the Slammer worm storm-on in’ back in 2003. It was a punch in the gut for many – networks crashing everywhere. I was wading into patches and emergency protocols. Slammer taught me something basic beyond just technical patches: the importance of layered defense. You can’t just have an all-in-one security tool and live in peace.

Fast forward to now — I have my own cybersecurity consultancy and have just assisted three banks to upgrade their zero-trust architectures. Zero trust — for those who are uninitiated — is basically trust nothing, even if you’re already on the inside. Day in and day out, every user, device and connection must constantly prove that it’s legit. Sounds rigid? It is. But here’s why it works:

And banks? They are prime targets. So, getting zero-trust right isn’t just technical nerd stuff — it’s all about protecting billions in assets and sensitive customer data.

But Here’s What the Vast Majority of Companies Fail to Do

They orgasm on fancy tech, but neglect the basics. I see it every day. If your password policy still requires odd characters from key positions or resets every 30 days, you may be doing it wrong. Here’s a little rant:

Password policies are terrible when they only mandate complexity, not user comprehension. Humans will find shortcuts. They’ll keep a row of passwords; they’ll add a ‘1’ at the end of an old password.

Better Approach:

And if you think AI-powered password-guessing tools will solve that, hold on. I’m skeptical. This is because when it comes to AI in the cyber-sec domain, what one hears most frequently is more marketing than miracle.

What I Learned at DefCon – Continued Buzz

Just returned from DefCon, the granddad of hacker confabs. I had pretty much camped out on the hardware hacking village. If you’re under the impression that cybersecurity is solely about hackers or lines of code, think again. Physical security flaws and vulnerabilities at a hardware level are huge blind spots for lots of companies.

The panoply of tricks for fiddling with devices — from power-grounding hacks to subverted firmware injections — was stupefying. Caused me to realize just how much undervalued the physical layer of defense is:

Here’s A Quick Take For You – Don’t Waste Your Time

Real Talk about Firewalls, Servers, and Routers

This is where I start to wax nostalgic. And to think routers and firewalls used to be the hardware boxes in the back of the rack. Classic days. With cloud and virtualization, with IoT, the complexity has now gone insane.

Every client I work for wants to know: how do I stay ahead? That’s when I have my default response: My answer is always rooted in experience:

There’s no fancy tech stack that replaces good hygiene and vigilance.

The One Mistake You Cannot Keep Making

When I started out, I didn’t take insider threats seriously enough. Thought so long as the firewalls strong, and the paswords policey’s tight, we cool. Isn’t it funny how that never lasts for long.

Your greatest concentraint will always be human – your employees themselves. From errant mouse clicks on phishing emails to disgruntled insiders, this vector doesn’t receive the attention it ought to in boardrooms.

Mitigations?

Why Cybersecurity Is Like Cooking

I’m a sucker for analogies. Think of cybersecurity as being like cooking some difficult dish. You can’t pile everything in and expect magic. It’s a layering thing — spices, heat, timing — or else it’s a disaster.

Not only that, you shouldn’t be throwing every security product in the mix without a plan, you’re just creating noise and confusion. Understand the recipe:

Final Thought Before My Fourth Cup of Coffee

After all, cybersecurity is not a one-and-done proposition. It’s like keeping up a vintage car that I used to fiddle with back in the ’90s — constant maintenance, the odd update and lots of love for the mechanics under the hood.

However you cannot neglect your network health and, as you can see, it will fall down when you don’t expect. I learned that the hard way from the Slammer worm. Aid to banks in creating zero-trust architecture years afterwards proved that. The physical hacks taking place at DefCon reminded me that the fight is not just long, but multi-dimensional.

So here’s my messy, caffeinated advice — Get back to basics. Don’t buy into every shiny new promise. And always be open to learning from your — and my — mistakes.

Stay secure, stay curious.

— Sanjay Seth
Cyber Security Consultant, P J Networks Pvt Ltd

Exit mobile version