The Pits and APTs


How concerts can help us understand APTs . . .


Especially if you use your imagination!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


My daughter reminded me of a concert Stacey and I attended way back in 2013, in Chicago.  It was one of those festivals whose name I lost track of, but there were a lot of what I used to call “Ska Bands” there.

Beyond the friends I went there with, the most memorable part of the concert was when, standing in what I thought were some good seats at the time, I was knocked over as soon as the band started playing.  I hadn’t realized it, but the reason the “seats” I had snagged were so good was because they were in a mosh pit.

I had heard of mosh pits by then, but had never attended a concert that deployed them.  Interestingly, the looks on the poor young adult faces is also a part of that memory.  There were like, “are you going to play or not?”  Stacey and my friends had already gotten the heck out of there, and it was just dawning on me what had happened when bam, somebody hit me from behind, causing me to fly right into one of the young men who had given the quizzical look.  Once I had brushed myself off, the second time, I ran as fast as I could to the edge of what was turning out to be a rather violent place in the festival.

After the first song was over, my friends laughed as one of the young adults, this one female, asked if I would be okay.  Oh Yeah!  Mr. Peace and Love Man from the sixties – knocked down twice in a mosh pit.


I wish our Clients’ networks could be like mosh pits . . . where there is a definite edge.  But this is not the case.  And the thing that has me worried about he APT these days is not as much “how do we find them on the network.”  Nope . . . it’s best illustrated by a mosh pit metaphor.

Because the APT does not stop attacking us, once we leave our network.  They are watching us, ESPECIALLY in those “semi-safe” zones . . . our homes, our hotels, our churches . . . wherever we use our endpoints.


Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

Dan’s New Leaf” a “fun blog to inspire thought in the area of IT Governance.”


same_strip_012513


 

Related Posts

The Magnificent Seven 2023

Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcom...

“Phone Phishing” – Awareness Poster (Re-release)

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers!Check out posters.infotex.com for...

“Strong Password Tips” – Awareness Poster

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers!Check out posters.infotex.com for...