Analogy of control types in Cybersecurity

October 8, 2022
Analogy of control types in Cybersecurity

Cybersecurity layers of protection

I’ve said that adding more layers of security may make your data safer in order to clarify why we need firewalls, antivirus software, and passwords in addition to security solutions (if done right). Making a hacker clear as many hurdles as you can before they can access your sensitive data will lower your risk.

Here, locking up the royal jewels is the parallel. Then you close the lockable chest that is enclosed in the vault and place the box inside. If you want to take the comparison a step further, you might imagine everything as being contained inside a fortress that is encircled by castle walls and all of which is guarded by a moat.

Putting extra security measures in place might make it more difficult for the wrong individuals to access your sensitive data, even if a hacker manages to get past one tier of defense. Because of this, you often need to go through numerous stages, such as inputting a password to access your computer, another one to access a particular program or service, and then utilizing 2-factor authentication to confirm your identity.

Cybersecurity arms race

When it comes to cybersecurity, both sides are continually improving their weapons and defenses, much as in an arms race. You must constantly improve your security plan or you risk falling behind the pack while using a sword and shield to fend off fighter jets.

On the one hand, hackers are continuously developing new phishing tactics, making new and more deadly varieties of malware, constructing traps for victims to fall into, and looking for new weaknesses to attack.

On the other hand, in order to avoid becoming a victim of new threats, the good guys need to create safeguards against them, update security software definition files continuously, patch software and operating systems on a regular basis, be vigilant online and inform everyone in their organization about them.

Your primary email holds the keys to many other accounts

Recently, we had to explain to a computer newbie why hackers may potentially access other accounts tied to the main email account if they get access to it (banking, shopping, secondary email accounts, etc.).

The analogy we used to make everything make sense was as follows: Assume that your family members dwell in several homes, and you store the keys to each location at your principal household. If someone breaks into the main home, they may enter the other residences as well since they have access to all the keys. You must thus replace the locks at every residence if you want to be secure; otherwise, you risk another break-in.

This entails updating any account passwords that are connected to your main email address in the real world. Make sure that no one has tampered with your associated cellphone numbers, backup email addresses, and security questions across all of your accounts, since these are additional entry points the bad guys may use even if the primary passwords are changed.

Call +1 416-471-4545 or go to to receive your 25% discount on all cyber security courses.

Recent Posts

Cloud encryption can be done in two ways: client-side encryption and server-side encryption.
March 27, 2023

Cloud Encryption and Key Management for Data Protection

In the modern age of technology, cloud computing has become a popular solution for businesses to store and access their data remotely. However, the convenience of cloud computing also presents risks for data security. Therefore, cloud encryption and key management are important aspects of data protection. Cloud Encryption: Encryption is the process of converting plain […]

Read More
Cloud Computing
March 19, 2023

How Cloud Computing is Revolutionizing the IT Industry

Cloud computing has transformed the IT industry by providing a scalable, flexible, and cost-effective way of delivering computing resources, including servers, storage, and applications, over the internet. The cloud has revolutionized the way businesses operate, allowing them to focus on their core competencies while leaving complex IT infrastructure management to cloud providers. This blog will […]

Read More
The Importance of Security in Cloud Computing
March 16, 2023

The Importance of Security in Cloud Computing

Cloud computing has revolutionized the way businesses operate by providing a scalable and flexible computing infrastructure that can be accessed from anywhere in the world. However, as more companies adopt cloud computing, security has become a major concern. Security in cloud computing refers to the protection of data, applications, and infrastructure from unauthorized access, theft, […]

Read More