CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

3 simple steps for talking about security at the holiday table, without it getting awkward

You're sitting around the holiday table - tired of hearing about Dad's new snowblower or the big-box store being built down the road - and you want to bravely steer the conversation to information security.

Make sense, because that's what you do for a living, and you care about your family staying protected online. (Well, at least most of them).

But you're not quite sure how to connect with them on this subject - beyond when your aunt asks for help because her printer won't print. If executed poorly, you could insult them, bore them or end up so frustrated that you find yourself gulping egg nog at an unhealthy pace.

Think of this as a practice session for the next time you're in your CEO's office, lobbying for more budget. Here's your plan of attack, in three-ish steps.

Speak in understandable terms

Cyber security is sexy. People have seen it talked about on the news, and chances are, they notice it more and more in their daily activities. But while drive-by downloads, 0-days, buffer overflows and trojan executables are your vernacular, for the rest of the world, you might as well be speaking Swahili.

When describing your job to the masses, it's best to consider yourself like James Bond: You fight bad guys and keep people safe. You just happen to do it online. But your job is cool. Own it.

Then, explain - in easy-to-understand terms - how most security incidents happen. Someone clicked on a link or attachment that looked legitimate. Or, they accidentally left their work laptop unlocked in their car. It can happen to anyone.

Come armed with stats about data exposure

People like numbers. Make it easy for them to understand how extensive the threat of malware and data loss is. For example, did you know that the expected increase in global data by 2020 is 2,000 percent? Or did you know that 705 million (and rising) personal records have been exposed in 2013, more than any year in recent memory? Or did you know that 93 percent of U.K. businesses reported being breached this year.

Want more stats? Turn to 2013 Trustwave Global Security Report.

Listen, be patient and offer something tangible

Your family may feel doltish in your presence and may be nervous to ask a question or admit something bone-headed they did while online. Remind them how good hackers are at tricking people - even security practitioners can be duped - and reassure them that everybody makes mistakes. Offer up an example of that one time when you misconfigured an adapter and it practically brought down the whole corporate network. They'll laugh. Hey, misery loves company.

Now that they feel more relaxed, they may inquire more about your job - allowing you to win points with Mom and Dad, who no longer have to describe your career to their friends as: "Oh, he works in computers."

Your work is almost done. To conclude, it's always helpful to provide a takeaway. You probably were offering security awareness advice throughout, but recommending free protection technology that they can easily install, such as the Trustwave SecureBrowsing tool, can't hurt.

Happy Holidays!

Dan Kaplan is manager of online content at Trustwave.

Latest Trustwave Blogs

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The "response" part of the MDR moniker is key to that effort,...

Read More