Wyle E. Coyote: Cyberthreat

Beep Beep!

In the classic cartoon, The Coyote endlessly and unsuccessfully chases the Road Runner. The Road Runner always seems to outsmart him, but the narrative is predicated on the Coyote’s use of the same old ACME box of tricks, the same old anvil to the head. Humans are also creatures of habit, and we often rely on the same old methods, even when we expect a different outcome. Hold this dynamite and watch me explain how this applies to cybersecurity.

Trap Door in the Cloud

In many parts of the U.S., coyotes are increasing in both number and impact on wildlife. The same seems to be true of hackers. Coyotes prey on deer while hackers prey on the data you hold dear. (See what I just did there?) Landowners have turned to trapping coyotes, hoping to bring nature back into balance, and there are cybersecurity lessons to be captured as well.

First, look for signs of activity. Be vigilant in protecting your network and data. Next, be where the hackers want to be, the soft underbelly of your operation, the point of greatest benefit with the least potential cost. Lastly, be confident that they are present. Just because you don’t see them doesn’t mean they are not there. They are, and they’re building a trap door in a hanging cliff you won’t even see until it’s too late.

Spelling Lesson

Cyberthreats are like coyotes, ever present in the darkness, clever and opportunistic. But ICS is the Daniel Boone of the Internet. We can run the traps along your network and drop anvils where needed, all for just a few pelts. Coonskin cap and musket not included.

Remember, you can’t spell security without ICS. Go ahead. Try it.
ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor