Fire prevention equals Cyberattack prevention?

Here are some dos and don’ts from the Riverdale (Md) Volunteer Fire Department   (not all are reproduced here)

Do install smoke detector

Do check heating system for blockage, and maintain system

Do check the electric cords for wear and replace if necessary

Don’t put ashtrays on sofa or  sofa arms

Don’t leave space heaters unattended or go to sleep while on

Don’t let grease build up in stove or range.


These 6 dos and donts are common sense items? In a forest fire we say if the conditions are right then the chance of a fire is high. So we have to be vigilant, when there are dry conditions and plenty of flammable material around (i.e. we are not in the desert).


So in Cybersecurity, where there is “flammable material” there  could be problems.  cloudinfrastructuredbservers

What is “flammable material” in the cyber world? Well, unfortunately if you are connected to the Internet you are at risk. So any computer, mobile or device on the net. So the user + computer = cybersecurity risk.

Risk management invites errors in less reviewed systems. So once the errors are found by hackers they will use the hacking methods to attack and defeat prevention methods (because it only takes a small error). And sometimes the hackers are waiting for Zero-day exploits  which can be used in phishing attacks to dupe unsuspecting users.

  • The key is to keep up on patches  and constantly be vulnerability scanning, recon scanning your systems.
  • Train your employees to resist phishing email clicks
  • Train  employees for social engineering and other criminal potential attacks (physical skimming devices)
  • You can even hire specific “high end” ethical hackers which will review your environment and try to fashion specific attacks to see if they can break through your best defense(Our Omega Scan).
  • Remove even some “informational” items that tell the hacker information for a better hack in future.

Then once we show you how we hacked your environment then we can help you fix the holes.

Contact us 

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.