IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology Security

Fotolia_196964748_XS.jpg

As a computer professional or IT specialist, your users know you are there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream

You acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy, particularly if you are new cybersecurity.  Perhaps you have an image of unsavory characters that lurk in alleys and dark corners wearing hoodies and sunglasses to disguise their identity.  The Dark Web is like a scene from Batman where you see in the underbelly of Gotham City cybercriminals lurking and waiting to collect stolen data.

As we know, the reality of what a hacker is and how they operate is much different than the cinematic version.  These are sophisticated groups that use advanced tactics and live and work among the rest of the world – unsuspecting and undetected. 

So Exactly How Dangerous is the Dark Web?

Like An Iceberg

One of the easiest ways to explain the concept is to present a visual, like using the iceberg analogy.  Like an iceberg, you can see part of that ice, (or internet) above the horizon, but much of the ice (and internet) resides deep below the surface.  This “deep web” is part of the internet that we cannot see or access via search engines.  But it is ALL THE SAME iceberg – or the same internet.   Now below the surface, in the deepest part of the ocean, in the darkest waters, you will find the Dark Web.  The information that is shared on the Dark Web is done via the darknet. 

How Do You Get There?

First, not everything below the surface is dangerous.  And above the surface, you can easily find what you’re looking for (search engines provide easy-to-use directions), but below, you’re going to need specialized gear…. goggles, a wetsuit, and a flashlight, if you will, to navigate the underwater tunnels.  And that kind of gear allows you to swim around anonymously, where nobody can see your face.  Next, you’ll need a means of transportation. This transportation is called The Onion Router, or TOR.  Why? Because like an onion, there are many layers to the deep web, and TOR is the gateway to getting access.

So, you’re geared up, no one can identify you, you have transportation, and you are about to jump into the deep web. Is the whole place dangerous? Short answer, no. It is just where the unsearchable information is stored on the internet.  By some accounts, this is 500 times bigger than what you find above the water.  For example, a Google search will tell you how to log onto a bank’s website (that’s a site that is above water), but your specific banking information isn’t searchable.  With the proper credentials to log in, you can access your own account – that’s stored on the deep web. It is the same for your email or health records. 

Let’s Dive Deeper

Those darkest, deepest waters…that is where the Dark Web is.  This is where the marketplace exists that sells personal information, stolen credentials, and sometimes worse. There are files here for sale that are organic and always growing with data that is acquired through breaches.  Yes, there is likely a file with your name on it, and some of your credentials.  The cybercriminals will purchase that information and use it to gain unlawful access to your accounts or to threaten you with an email that contains a password that you once used. This is why understanding cybercriminals’ current tactics and best practices to protect yourself and your accounts are so vital.

How to Stay Afloat

Staying ahead of cybercriminals is an ongoing battle.  As soon as you learn new cybersecurity habits, they learn new tactics to fool you.  That is why an ongoing training program is essential to the protection of any business or organization – we’re all human and humans make mistakes.  We can offset the risk that those mistakes present with a plan of attack when it comes to identifying gaps and mitigating the risk of human error. 

Why not take advantage of our Free Dark Web Scan to help enhance your skills and familiarity with the Dark Net and its inner workings:

https://www.itspecialist.com/Products-Services/Dark-Web-Scan

______________________________________________________________________

Get a Complimentary Baseline Employee Security Assessment from IT Specialist! 

IT Specialist Cybersecurity Services now offers a free employee security assessment that provides an organization with a starting point to show them where employees currently stand when it comes to their cybersecurity knowledge or security awareness posture. This assessment is delivered via a unique URL to employees, where they’ll answer a series of questions across six distinct categories to gauge their current security awareness training, if any. Those categories include:

  1. General Cybersecurity Knowledge
  2. Phishing Awareness
  3. Password Hygiene
  4. Handling PII
  5. Social Media
  6. Working Remotely

Once employees complete their assessment, their results are recorded along with the overall time taken to complete the assessment. The organization’s management team or owners are sent a report by IT Specialist that provides the average score across all employees who completed the assessment, as well as their individual scores. The report even breaks down each of the six categories to show management where their employees are struggling the most. 

IT Specialist Baseline Employee Security Assessment is non-intrusive, highly informative, and easy to understand.

Get Started Now

Or Cut and Paste the URL listed below into your browser:

https://www.itspecialist.com/Products-Services/Complimentary-Baseline-Employee-Security-Assessment

Showing 0 Comment

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on IT Specialist.com, you can quickly gain exposure as an opinion leader or subject matter expert in information technology with our large audience of technical professionals located around the world. And as an added benefit, our website supports multi-lingual textual translation via Google. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated on our broader IT Specialist Network or platform. Contact us for details.