Home Whiskey Tango Foxtrot! Is journalism responsible for weak cyber security?

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

As an industry, we focus on the latest and greatest hacks, intrusions, tools and techniques. But in doing so, are we neglecting the biggest audience for our advice?

In order to "attract eyeballs," the average IT journalist will hunt down what is new and interesting. This means chatting with leading edge vendors, with large organisations and with a whole slew of pundits and commentators (mea culpa!).

All of these people are operating on the 'bleeding edge' and are actively involved with the esoteric, the sublime and the amazingly complex. This is their life-blood and their meal-ticket.

We, as a communication and information industry, report on these wondrous new things as if they're the only topic worthy of conversation, yet this is of little interest to those smaller organisations who don't have 300 servers; who don't have multiple offices and the communication infrustructure that requires; who don't have a team of experts to keep things running and to deal with any issues.

What we need instead is to recognise that we should be speaking to everyone who uses computing infrastructure to achieve their business aims (which is probably everyone!). Something like 96% of businesses in Australia are regarded as "small businesses", meaning that they employ fewer than 10 people – often only one or two. Any journalism that addresses APTs or polymorphism or DNS poisoning (to grab three advanced topics at ramdom) will mean nothing to these people – they're too busy creating invoices, dealing with emailed purchase orders and telephoning courier companies to scream about a missing delivery.

As Sean Duca, regional chief security officer, Asia Pacific for Palo Alto Networks, noted, "the average small business owner thinks that anti-virus is all the security they need." As I listed to that comment, I immediately realise that I was part of the problem.

If they ever actually make back-ups of important files, these small business owners might burn a DVD occasionally, or perhaps copy a bunch of files to a memory stick to take home, hoping that the anti-virus means everything is fine.

If they ever actully make backups.

They might even "upgrade" their security by moving from vendor A's anti-virus to that of vendor B. Or worse still, install both!

All of this is telling me that we all (IT journalists) must do better. We must recognise that our audience needs a certain amount of hand-holding; that we need to say the same things many times; that we need to reduce our focus on the golly-wow end of the spectrum.

With that in mind, this will become the first in a series of "simple security" pieces that will assist small businesses to protect themselves in this modern environment.


Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Popular News




Guest Opinion


Sponsored News