Although it may seem fast-paced and glamorous, the cyber threat landscape is actually more populated with simple, garden-variety attacks than sophisticated and exotic techniques.
With free tools and kits, it’s become easier than ever to engage in phishing, cross-site scripting, and other malicious activities. When we imagine all cybercriminals as masterminds using bleeding-edge tools, we often take the wrong approach by focusing on rare threats and unlikely circumstances. By shifting our perspective from the Hollywood-induced imagery of Hackers and Mr. Robot, we can begin to see that effective cybersecurity is more about building good habits, practices, and routines – a la Groundhog Day – than having the latest, most advanced defense tools and services. So, what does a good cybersecurity routine look like?