Confessions of an IT Professional – Part 1

By November 5, 2018 January 30th, 2019 Security
Confessions of an IT Professional Series

Terry Allen, Technical Engineer, OXEN TechnologyThis week’s article is the first in a series by OXEN’s own Terry Allen, one of our technical engineers based in Joplin, MO.

This post originally appeared on Bloggin’ IT with Terry Allen and is reprinted with permission.


This post is rated E for everyone.

These aren’t deep, dark secrets–but they are confessions in two senses:  1) admission and acknowledgement and 2) a statement of one’s principles.  I have to confess that most of what we’re doing today to protect ourselves from modern Internet threats is insufficient.  Before you bail on me banging the ‘security drum’ again, stick with me a little bit longer and catch my main idea:  we’ve got to do more than just consume IT and learn how to adequately protect ourselves from modern Internet threats.  Don’t wait until you get mugged in an Internet back alley before taking proactive responsibility for technology that enables our lives and businesses!

Modern Internet threats are motivated by a lot of different things.  It’s a common thought that “malicious actors” (aka the bad guys) wanted to steal our data for its value, like identity theft or credit card numbers.  These data are still valuable targets but the focus has shifted.  Malicious actors are using another powerful motivator for digital crime:  It’s not only about how valuable your data is to them.  The more valuable question is, how valuable is your data to you?

I’ve been around Information Technology for a little while.  When we talk about “cybersecurity”, we’re often talking about one or more of these ingredients:

  • User ID & password
  • Antivirus
  • File backup
  • Firewall
  • Antispam or e-mail filters
  • One time setup & forget it

My first confession: this is not enough to protect us from the threats of a modern day Internet.  A lot has changed in the world to make our traditional security measures less effective.  A few examples are Next Generation or UTM firewalls, new classes of malicious software (not just viruses anymore), email attacks through use of harmful web links or file attachments, evolution of system image backups and multi factor authentication–just to name a few.  Many of you may not identify all of the these examples.  And that’s why I need to confess more to you.

It’s easy to use technology out of the box or consume the free online service.  But these things come with a price.  We must start thinking about approaching technology like we do our homes, cars or health.  It can seem like a significant burden to educate ourselves about these things but that’s part of the “total cost of ownership” of making technology an enabler for so many things.  It has been elevated to a utility that many of us cannot function without.  We’ve built it into our lives and we’re greatly inconvenienced or even disabled when it doesn’t function right.

In future posts, I want to deal with each of these topics briefly as it relates to home and business users.  Technology has never been a bigger part of our lives and the risks to our security, privacy and functionality are equally as big.


Recent Posts / View All Posts

The Importance of Multi-Factor Authentication (MFA)

Security Lockdown: The Importance of Multi-Factor Authentication (MFA)

| Security | No Comments
You may have noticed that recently a lot of your accounts are now requiring multiple methods of verifying your identity when you login. No longer do you just enter your username and password to get into your email, your cloud apps, or your accounting system. You now also need to input a short code that is texted to you, generated by an app, or emailed. In some cases, you might be getting verification phone calls, using a smart card, or entering biometric data like a fingerprint. What is this? This is multi-factor authentication (MFA). MFA consist of three things that…
Tips for Outlook Calendar

Tips for using Outlook calendar

| Tech Tip | No Comments
Confession: I am not an Outlook Calendar junkie. But if one of my coworkers looks at my calendar, they’ll likely see a smattering of events, tasks, and outside work commitments on my calendar. I also have a very long list of “Shared Calendars” so I can check up on coworkers’ schedules – it’s not lurking if it’s business! Like most people at my company, I use Outlook Calendar to remind myself and everyone else (who cares to know) when I am and am not available. Outlook Calendar is an invaluable tool if you’re in the habit of checking if someone…
2020 Cybersecurity Update from OXEN Technology

2020 OXEN Update on Cybersecurity

| Consulting, Security | No Comments
Every day we read about another cybersecurity breach. Lost credit card information, hacked emails, corporate or national security information stolen by insider or external actors. Cyber espionage and security attacks have become sophisticated and big business. We have reluctantly learned a new language: ransomware, “phishing”, malware, HIPAA (in healthcare), PCI (for credit card protection), and PII (personally identifiable information) to name a few. The challenge grows even faster as more and more devices are attached to our networks. New devices like thermostats, smart lights, cell phones, watches, and smart monitors of all types connect to our networks to share information.…