And Checkmate! If you are familiar with chess, this is not something that you want to hear. It means that you are in a position with your king piece that you cannot escape. It’s Game Over man! In case you didn’t know, there’s a serious game being played today involving your data and identity. On one side are cyber attackers, and on the other are those who are trying to defend your privacy and personal accounts. Cyber Security is much like a game of chess!
You might be thinking, A game? Like chess? Well let me explain!
Hacking is probably not a new term for you, in fact hacking has been around for many of years. There is an early account from 1971 were a hacker named John Draper, hacked into phone systems using a plastic toy whistle from a cereal box. Crazy, right?
Well in the early days of the internet and the personal computer, hacking was a game for many hobbyists (There are still people today who participate in hacking championships for fun) The early hackers would test the boundaries of what they could do, and what they could get away with, however, while some treated hacking as a fun innocent game, others began to realize the potential for malicious and criminal behavior.
Now Jump forward many years, and as cyber attackers have become more sophisticated, the security industry has grown to defend against it. With new types of attacks developing all the time, we develop new strategic defenses to block and prevent them. Security tactics now become outdated as soon as attackers find ways around them, meanwhile, attackers continue to rely more on social engineering tricks that are hard to defend against in general.
They make a move, then we make a move, and then they make a move, and so on and so on!
For us in the Information Security Department at Columbia College, cybersecurity is a lot like a game of chess. There are many pieces to move, and our strategies needs to keep tabs on all of them. We must adjust to our adversaries’ moves, move quick against attackers and protect your king at all costs. The cybersecurity game continues, but even as the stakes are rising, the rules are changing. It’s now more complicated than ever.
So, what can you do to help keep you ahead in this always evolving cybersecurity game?
- Complete your Columbia College annual Cyber Security Training.
- This will ensure that you are update to date on best practices when it comes to being cyber secure.
- Follow the best practices and polices outlined by Technology Services
- Use strong passwords and never share your password.
- Remember that not ever Technology Services will ask for your Columbia College password.
- Report all suspicious emails to Technology Services at cchelpdesk@ccis.edu
- Even if you know it is a phishing attack and ignore it, by reporting it you can help the Information Security Team identify and mitigate the attack for others.
- Be mindful of the information you post online or on social media.
- Social Engineers can use all sorts of information you post to help them take over your identity.
- Be Aware
- The Information Security Team is growing, and dedicating itself to not only keeping our systems secure, but bring awareness and education to you to help keep you more secure in the office and at home.
- Stay up to date with all that we are doing at our blog!