{"id":41548,"date":"2020-06-17T19:18:07","date_gmt":"2020-06-17T15:18:07","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=41548"},"modified":"2025-11-21T13:27:24","modified_gmt":"2025-11-21T09:27:24","slug":"sam-bocetta-what-ive-learned-from-a-lifetime-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/sam-bocetta-what-ive-learned-from-a-lifetime-in-cybersecurity\/","title":{"rendered":"Sam Bocetta: What I&#8217;ve Learned from a Lifetime in Cybersecurity"},"content":{"rendered":"<p>In the mid-1970s, when I was working in the Navy\u2019s new cybersecurity group, we had it easy.<\/p>\n<p>Not that we felt like that, of course. Automation was still pretty primitive, and encrypting messages often took hours (if not days). But looking back, we had one huge advantage over the cybersecurity engineers of today: we didn't let anyone touch our equipment. Everyone had to go through us to send messages and protect data, and so we could make sure that this was done correctly.<!--more--><\/p>\n<p>I suspect that these reflections have come to mind recently because of the COVID-19 pandemic. Most of my younger colleagues are now having to deal with a problem that was almost unheard of in my day \u2013 how to make sure that staff doesn\u2019t undermine security controls, and how to educate them out of the <a href=\"https:\/\/www.msp360.com\/resources\/blog\/5-cybersecurity-misconceptions\/\">common misconceptions about cybersecurity<\/a>\u00a0(Read more about <a href=\"https:\/\/www.msp360.com\/resources\/blog\/covid-19-and-cybersecurity\/\">COVID-19 and cybersecurity<\/a> in our blog).<\/p>\n<p>And so, amid talk about the setting up of a <a href=\"https:\/\/www.csoonline.com\/article\/3397843\/federal-cybersecurity-agency-on-the-way.html\" target=\"_blank\" rel=\"noopener noreferrer\">Federal cybersecurity agency<\/a>, and much excitement about the way that <a href=\"https:\/\/www.dataversity.net\/how-ai-helps-organizational-cybersecurity-in-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">AI is helping organizational cybersecurity<\/a>, I thought I'd take the opportunity to share some wisdom gained from 50 years in the business.<\/p>\n<p>Spoiler alert: nothing ever really changes. Your users are still the biggest threat.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48232 size-thumbnail alignleft\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-150x150.png\" alt=\"Sam Bocetta for MSP360\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-300x300.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-250x250.png 250w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed.png 400w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>About the author<\/strong><br \/>\nSam Bocetta is a <a href=\"http:\/\/assignyourwriter.co.uk\/\">cybersecurity coordinator<\/a> and a freelance journalist specializing in U.S. diplomacy and national security, with emphasis on technology trends in cyberwarfare, cyberdefense, and cryptography. (<a href=\"https:\/\/www.msp360.com\/resources\/wp-admin\/sbocetta@assignyourwriter.co.uk\">Email<\/a>, <a href=\"https:\/\/twitter.com\/sambocetta\">Twitter<\/a>)<\/p>\n<p><a href=\"https:\/\/www.msp360.com\/resources\/blog\/author\/sam-bocetta\/\">More articles by Sam<\/a><\/p>\n<h2>Automation, Automation, Automation<\/h2>\n<p>I would hope that the value of automation is clear to most cybersecurity analysts. If it's not, you should revisit your sophomore textbooks. When it comes to IT tasks, there is a fast, efficient, and safe way to do things, and then there is doing the same task manually. Your boss might not understand why you are spending a week automating a process that will take one hour by hand, but you certainly will.<\/p>\n<p>I don't know how many hours (days, weeks, months) I've saved over the past 50 years by automating tasks the first time I was given them, but suffice to say I probably wouldn't have reached retirement age if I had had to do everything by hand.<\/p>\n<p>Beyond saving you time, automation also has another huge advantage: it is safer. There is nothing more likely to cause mistakes than having to complete a repetitive, boring task once a week. By automating your processes, you reduce the possibility of human error, which \u2013 as I will explain shortly \u2013 is still the biggest challenge that cybersecurity analysts face.<\/p>\n<h2>Policies Are Useless<\/h2>\n<p>A second, related point that I want to share is this: that cybersecurity policies are not worth the paper (or drive) they are written on.<\/p>\n<p>That might come as a shock, so let me qualify it slightly. It's certainly important for organizations to think carefully about how to protect themselves, and for security staff to have a central policy from which to work.<\/p>\n<p>But you should also recognize that most of your staff are not going to read your carefully designed policy, let alone follow it. Just look at how few employees take the most basic steps <a href=\"https:\/\/surfshark.com\/blog\/top-10-business-security-systems-for-2019\" target=\"_blank\" rel=\"noopener noreferrer\">to shore up their business computer security<\/a>, and you'll see that most simply don't recognize the value of cybersecurity.<\/p>\n<p id=\"last\">So what's the solution?<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<div class=\"perfect-pullquote vcard pullquote-align-full pullquote-border-placement-left\"><blockquote><p>Well, technical controls. Don't ever rely on users to follow a policy. Instead, lock down what they can do with their machines as much as possible. They will complain, but it's for their own good. <\/p><\/blockquote><\/div>\n<h2>Beware the User<\/h2>\n<p>All of these points lead to my final observation: never trust your users.<\/p>\n<p>This is an old adage in the cybersecurity business, but one that bears repeating. It is also one that is backed up by the stats; despite all the advances made in AI-driven threat intelligence systems and on-the-fly endpoint security over the past two decades, the simple phishing email remains the biggest threat to most systems.<\/p>\n<p>Some analysts will tell you that the user is just poorly informed, and not actively mischievous. They claim that if you provide your users with a <a href=\"https:\/\/privacyaustralia.net\/complete-guide-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">guide to encryption<\/a> and managers with a <a href=\"https:\/\/www.msp360.com\/resources\/blog\/the-msps-guide-to-vetting-cybersecurity-vendors\/\" target=\"_blank\" rel=\"noopener noreferrer\">guide to vetting cybersecurity vendors<\/a>, they will educate themselves and make intelligent decisions. Don't believe it.<\/p>\n<p>I don't mean to blame users, of course. It's just that their priorities are completely different from those of security analysts. The biggest benefit conferred by IT, for most people in most situations, is speed. This means that users might be happy to comply with security controls when they are not stressed out, and not being pushed to compile a report within the next few hours. But realistically \u2013 how often is that the case?<\/p>\n<p>Limiting the damage that your users can do to your systems can be approached in a number of ways. Limiting their access to critical systems is a good start, as is educating them about the true dangers of working insecurely.<\/p>\n<h2>Nothing Ever Changes<\/h2>\n<p>Or, I guess, you could take a more draconian route, and not allow your users to do anything at all. That was our approach in the Navy, where access to mainframe terminals relied on extensive vetting processes and a knowledge of how these machines actually worked. In practice, no one without a grad degree in computer sciences got anywhere near a computer, and it was great.<\/p>\n<p>Nowadays, of course, that's not really feasible. Unfortunately.<\/p>\n<p>But the principle remains the same: there really is nothing new under the sun. The most important lesson I can give from 50 years in the business is that you should limit access to critical systems to those staff who actually need to use them, and who actually understand them. Whether you are <a href=\"https:\/\/www.msp360.com\/resources\/blog\/5-critical-cybersecurity-tips\/\">running an SMB<\/a> or a huge multinational corporation, the user remains your worst enemy, just as he or she did back in the 1970s. We were just lucky we didn't have to let them in the server room.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the mid-1970s, when I was working in the Navy\u2019s new cybersecurity group, we had it easy. Not that we felt like that, of course. Automation was still pretty primitive, and encrypting messages often took hours (if not days). But looking back, we had one huge advantage over the cybersecurity engineers of today: we didn&#8217;t [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":41564,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-41548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=41548"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41548\/revisions"}],"predecessor-version":[{"id":61426,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41548\/revisions\/61426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/41564"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=41548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=41548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=41548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}