TALKING ABOUT CYBER RISKS

To point out some of the risks and cyber attacks that we may be victims of, Reimers groups them into four main areas: information theft, information destruction, information alteration and preventing you from entering your information.

He says that to minimize the risks, a thorough analysis of each of them should be done. So we can choose the technology and the necessary measures to avoid them.

We also talk about security systems applied to electoral processes. In this regard, Reimers believes that it is not so much a technical problem as a social problem. Protecting an electoral system from a technical point of view, that 50 votes cast is 50 votes counted, is simple. The current problem is in the manipulation of the electorate.

Manipulating reality, in a world where information saturates our social networks, is much simpler than what we believe. For the expert, we need to “mature socially” to handle so much information. Social networks "know us", they know what we like and what we don't. Therefore, those who know how to manipulate the information we receive, can make us have access to the news that strengthen our phobias and exalt our filias, and use them to tip our intention to vote.

He says that the Russians are very good social engineers, and that behind those who today are dedicated to these tricks there is a story, that of the extinct Soviet Union, which gives them support.

THE DEEP WEB AND ITS DANGERS

What we see on the web is the tip of the iceberg, says Reimers. Most of the web content is in the dark web, it is below, in the non-indexed content. There you can find everything but it is like shopping in a dangerous colony: you can get out of there without what you intended to buy and without the money you were carrying to do it.

He says that the authorities are constantly monitoring that market, which not only puts at risk those who sell illegal products and services (in the deep web you can buy the same drug as the services of a hired killer) but those who consume them .

On Israel and cybersecurity, the expert says that Israel is a leader in that field. "To talk about cybersecurity without having Israel on the spectrum is to be ignored or to have a non-complete part." The large publicly owned systems protection companies listed on the New York Stock Exchange are of Israeli origin, as well as the technology they use, He says.

This is due both to the high level of education that exists in Israel and to the war situation faced by that country and which makes it necessary to have state-of-the-art technology, always up-to-date, to face the national security challenges facing Israel.

To conclude the interview, Reiners gave us an overview of the concept of "intelligence." What it is, how it differs from espionage and why all countries turn to it to protect their interests.

Comments

Popular posts from this blog

Top 7 security mistakes when migrating to cloud-based applications

Disconnected from the server

WAN port: for advanced and different from LAN