fbpx Skip to main content

Confessions of an IT Professional – Part 1

By November 5, 2018January 30th, 2019Security
Confessions of an IT Professional Series

Terry Allen, Technical Engineer, OXEN TechnologyThis week’s article is the first in a series by OXEN’s own Terry Allen, one of our technical engineers based in Joplin, MO.

This post originally appeared on Bloggin’ IT with Terry Allen and is reprinted with permission.


This post is rated E for everyone.

These aren’t deep, dark secrets–but they are confessions in two senses:  1) admission and acknowledgement and 2) a statement of one’s principles.  I have to confess that most of what we’re doing today to protect ourselves from modern Internet threats is insufficient.  Before you bail on me banging the ‘security drum’ again, stick with me a little bit longer and catch my main idea:  we’ve got to do more than just consume IT and learn how to adequately protect ourselves from modern Internet threats.  Don’t wait until you get mugged in an Internet back alley before taking proactive responsibility for technology that enables our lives and businesses!

Modern Internet threats are motivated by a lot of different things.  It’s a common thought that “malicious actors” (aka the bad guys) wanted to steal our data for its value, like identity theft or credit card numbers.  These data are still valuable targets but the focus has shifted.  Malicious actors are using another powerful motivator for digital crime:  It’s not only about how valuable your data is to them.  The more valuable question is, how valuable is your data to you?

I’ve been around Information Technology for a little while.  When we talk about “cybersecurity”, we’re often talking about one or more of these ingredients:

  • User ID & password
  • Antivirus
  • File backup
  • Firewall
  • Antispam or e-mail filters
  • One time setup & forget it

My first confession: this is not enough to protect us from the threats of a modern day Internet.  A lot has changed in the world to make our traditional security measures less effective.  A few examples are Next Generation or UTM firewalls, new classes of malicious software (not just viruses anymore), email attacks through use of harmful web links or file attachments, evolution of system image backups and multi factor authentication–just to name a few.  Many of you may not identify all of the these examples.  And that’s why I need to confess more to you.

It’s easy to use technology out of the box or consume the free online service.  But these things come with a price.  We must start thinking about approaching technology like we do our homes, cars or health.  It can seem like a significant burden to educate ourselves about these things but that’s part of the “total cost of ownership” of making technology an enabler for so many things.  It has been elevated to a utility that many of us cannot function without.  We’ve built it into our lives and we’re greatly inconvenienced or even disabled when it doesn’t function right.

In future posts, I want to deal with each of these topics briefly as it relates to home and business users.  Technology has never been a bigger part of our lives and the risks to our security, privacy and functionality are equally as big.


Recent Posts / View All Posts

Managing Passwords

Why Are Managing Passwords So Hard?

| Business Productivity, Security | No Comments
We do most of our business online—emailing, shopping, banking, and much more. But before you take any action, you must log in with a name and password. It’s pretty routine, but with the rapidly growing number of online services that require passwords, it can get increasingly difficult when we are managing these passwords. Managing Passwords Can Be Difficult We all know that passwords are necessary to ensure that only you will access your accounts. But managing passwords can become somewhat hard, especially when you already have so many that you need to remember, and we can all relate to this,…
Best Password Management

Best Password Management for Businesses

| Security | No Comments
The best password management is important for businesses. If your passwords are weak or not stored in a safe location, hackers can easily penetrate your system, causing a myriad of damage to the company, your clients, your customers, and who knows what else. You don’t want that to happen! Fortunately, there are now a lot of reliable password management solutions that are ideal for business use. Some are browser-based, while others are applications you can download onto your computer or smartphone. But if you want the best password management solutions, go with those based in the cloud. Advantages of Cloud-Based…
Password Management

Why Businesses Need Password Management

| Business Productivity, Security | No Comments
As digital technology becomes more advanced, so do the risks of online security breaches. Cyberattacks continue to be a problem, so businesses need to implement reliable security measures now more than ever. There are many security solutions available. One of the simplest yet most effective is a first-rate password management solution. What Is Password Management? Password management is a general term that refers to the steps a business uses to keep passwords secure. It includes everything about passwords, from knowing how to pick a good one all the way to using advanced software to store and regularly update all the…