Skip to main content

Password ≠ Password - Security Is Everyone's Responsibility

In a world that is becoming more and more integrated with technology, network security will continue to be a major focus. Ensuring user and company data is secured is like trying to hit a moving target. When an area of vulnerability is found and resolved, another will inevitably be found. There is no shortage of people who will try to exploit technology with nefarious intentions so continuously learning and evolving network security will be a critical component of our future. When I was young and newly interested into the world of computers and technology, I was always fascinated by the computer savvy and idolized computer nerd type characters in television and film. I also recall someone telling me about a school that taught you how to hack computers and networks so you can learn to defend against attacks. Although dismissed at the time, the thought stayed with me through the years and now that a career in IT is a real possibility for me that conversation and memory resurfaced.

Major credit reporting agency Experian reports fraud incidents relating to identity theft rose nearly twenty percent to more than 5.8 million in 2021 amounting to over 6 billion in losses (Akin, 2022). The site also goes on to write that while phone call and text messages are the two leading causes by contact attempt, immediately following are email and websites or applications. Information and system security are paramount for individuals and organizations alike.

As an individual and as a consumer utilizing technology is sometime unavoidable. Many companies actively steer you towards electronic payments and some even offer benefits for utilization versus mailing a check, so it is critical that you take steps to safeguard your information. People will always try to exploit technology for nefarious reasons so learning to protect yourself and your information is critical. As an organization, aside from the direct monetary losses caused by fraud, the losses due to negative reputation can be insurmountable. Anytime news breaks of a major hack or leak of customer information, it immediately casts a negative light on that organization forever. No matter what changes may have implemented there will always be a percentage of people that will never utilize that company again. Add in the possibility of viral negative word of mouth on social media and that negative experience can reach millions more people.

Denial of Service (DoS) or Distributed Denial of Service (DDos) attacks are some of the most common ways to utilize a ping attack. DoS attacks are from a single machine while DDos attacks are from multiple machines. By flooding the traffic of the targeted system or machine, it denies legitimate users access to that system (Yihunie et al., 2018). While this is a common tactic for cyber-attacks, person to person attacks will still always be a problem. Social engineering uses deception and manipulation to get people to provide personal information or access to personal information. People will pretend to be a supervisor of a company to trick entry level employees to give customer information. They’ll also send emails with links to bogus websites that could potentially steal your information or install malicious applications on your computer. This is why information and network security is critical for everyone. Question the validity of the website you are entering information into, be wary of the email sent with links or attachments, and remember to stay vigilant.



Akin, J. (2022, October 11). Identity Theft Is on the Rise, Both in Incidents and Losses. Experian. https://www.experian.com/blogs/ask-experian/identity-theft-statistics/#:~:text=to%20the%20FTC.-,Fraud%20Statistics,identity%20theft%20and%20other%20complaints.


Yihunie, F., Abdelfattah, E., & Odeh, A. (2018). Analysis of ping of death DoS and DDoS attacks. 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Systems, Applications and Technology Conference (LISAT), 2018 IEEE Long Island, 1–4. https://doi.org/10.1109/LISAT.2018.8378010







Comments