Cybersecurity

 

 

Cybersecurity

by Diane Calabrese | Published July 2025

 

Cybersecurity stock image

 

Illusion, work-in-progress, unachievable goal or some of each? We each have a perspective about cybersecurity.

And the perspective likely changes frequently. Hacked and tracked defines life in the digital world. But on the days that we receive no advisories about a hack involving our data or an alert that a tracker has been placed on our phone, we carry on with caution.

How much caution? It’s a digital/electronic world and we can spend all our time installing and monitoring apps that promise more security. Or we can strike a balance for living with the truth: Cybersecuity is mostly an illusion.

As long as there are thieves, there will be no absolute security. A safe that could not be cracked could be blown up. The most innocent-looking rail or stagecoach passenger could be a robber in disguise. No period in history offered firm security.

And our period is no exception. The scale of the theft/disruption is, however, new.

A single hacker sitting anywhere in the world can potentially access data or disrupt systems across the globe in seconds,” says Gus Alexander, CEO of FNA Group in Pleasant Prairie, WI. “That kind of reach is unheard of in traditional crime.”

And, explains Alexander, the speed at which digital theft can happen means it can elude immediate detection. “Think of ransomware or data breaches that go unnoticed for months.”

There’s a second novel aspect. “Digital theft often involves copying rather than taking,” says Alexander. Thus, the owner may not know anything has gone missing.

“Criminals can mask their identity with sophisticated tools like VPNs, the dark web, or botnets, making attribution extremely hard,” explains Alexander. “The concentration of value in cyberspace, [aggregates] such as financial systems, health records, intellectual property, and personal identities are all stored and transacted online, amplifies the risk.”

Although we have all been warned repeatedly for many years to be wary of phishing schemes (emails) and the vulnerability of outdated software, the two areas continue to be weak and easy entry points for hackers, explains Alexander.

Just as there’s no such thing as absolute security in the real world, there is none in the cyberworld. As in the real-world security – to the extent it can be achieved, hinges on “risk management and threat mitigation,” explains Alexander.

Why? “Every system has vulnerabilities, especially as tech evolves and attack surfaces expand,” says Alexander. “What’s secure today will be obsolete tomorrow due to new exploits, tools, or adversarial tactics.”

We can reduce risks and detect (some) breaches, and we can respond to them, explains Alexander. But we cannot eliminate them entirely.

“We have a very robust system that detects a potential cyber security attack but professionals that I have spoken to prefer terms like ‘cyber resilience’, ‘information assurance’, or ‘risk management’ because they more accurately reflect the dynamic, defensive posture of their field of expertise,” says Alexander. He adds that the word ‘cybersecurity’ may set up false expectations for the public and organizations.

We all know the adage that the strongest chain will be broken by the weakest link. And, unfortunately, the weakest link in cybersecurity is often a momentary lapse in judgement.

Human behavior, such as team members not following protocols, can lead to a breach. “People fall for phishing, use weak passwords, ignore updates, or bypass security for convenience,” says Alexander. “Even with strong tech in place, one click can open the door.”

Even with all team members vigilant, risk is ongoing. “New threats emerge constantly — zero-day vulnerabilities, AI-enhanced attacks, advanced persistent threats [among them],” says Alexander.

In addition to human behavior and the speed at which threats emerge, there’s are other significant weak spots, says Alexander. “As companies adopt cloud services, remote work and mobile tech, there are just more entry points to secure. And even if your systems are tight, third-party vendors might expose you”

The level of risk can overwhelm new and growing businesses. Where to begin? That becomes the question they ask themselves.

Alexander’s advice? “My top recommendation is as follows: Start with a cybersecurity risk assessment.”

The assessment details what’s a risk – data, systems, processes,” explains Alexnder. And it identifies the most likely threats and biggest vulnerabilities. It is the guide for prioritizing actions that will improve security (reduce risk).

Employee training follows as an immediate second to the assessment. “Teach staff how to spot phishing and follow basic computer hygiene,” says Alexander. “Strong passwords plus multi-factor authentication, which is easy to deploy, highly effective.”

Perform regular system backup, and test recovery too, says Alexander. “Finally, constantly patch and update, which will keep your system and software current. At the end of the day without knowing your risks, you’re just throwing darts in the dark.”

 

CISA

 

Since 2018, the United States has had an agency dedicated to cyber- and physical (infrastructure) security. CISA, the Cybersecurity and Infrastructure Security Agency (CISA) is part of the Department of Homeland Security (DHS).

How is CISA doing? Given the torrent of threats and negative events being reported, we could conclude ‘not well’. On the other hand, we don’t know how many threats were thwarted.

Anyone who retains a complacent view of the status of cybersecurity – as in, all is well, should take a moment to visit the CISA website (https://www.cisa.gov/) and review updates and recommended actions.

The early days of May include reports of “unsophisticated” entities targeting operational technology (OT) and industrial control systems (ICS) both inside and outside government. The bottom-line recommendation from CISA regarding how to be prepared to respond is to be sure an organization has the capability to convert to manual operations.

How many readers are prepared to convert immediately to paper? Could schedules, invoices, work orders, inventory and shipping records be found?

Again, if in any doubt how vulnerable we are given our full immersion in the cyberworld, visit the CISA website. CISA, as well as the FBI, provide many suggestions about how to reduce risk. (FBI’s most recent warning was to update old routers).

Worrisome is that some recommendations from CISA seem dated. For example, “limit personal information you share online.”

Appraising cybersecurity from a broad vantage, we might conclude that there is a misalignment between the threats and the actions being taken by nation to combat them. (This is the writer’s view.)

Today, our federal government – or part of it, is taking up the plans for a Golden Dome, or missile defense system to protect the country. One could ask whether the threat from cyberattack is not greater and more immediate than the threat from missiles.

After reading the April 3 (2025) press release from CISA, which is titled “Fast Flux: A National Security Threat”, many might conclude we are more vulnerable that we imagined. Networks with gaps in security have been lagging behind in detecting malicious actors that exploit fast flux techniques.

With fast flux, cybercriminals evade detection by rapidly changing DNS (domain name system) records. In addition, they can create command and control infrastructure that conceals subsequent malicious operations, according to the CISA press release.

The foregoing is the nugget version of fast flux. Read the entire release at the CISA website to grasp just how fragile our cyberworld is. (Being prepared to go manual doesn’t seem adequate preparation.)


Current Digital Issue

Click to read.

Archives

April 2026
March 2026
February 2026
January 2026

  1. More Archives >>

    December 2025
    November 2025
    October 2025
    September 2025
    August 2025
    July 2025
    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021

    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    October 2014
    September 2014
    July 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013