You’ve seen the TV show before. A shadowy miscreant in a black hoodie is furiously typing away at a keyboard, illuminated only by the glow of the monitor. Suddenly, a dialog box pops up: “ACCESS GRANTED.” The attacker has successfully hacked the mainframe. Unfortunately, Hollywood’s portrayal of “hacking” doesn’t quite match up with the challenges of cybersecurity these days.

When you study the attacks of recent years, a familiar pattern starts to emerge. First, the attacker sends out a phishing email. Far from the easily detected Nigerian prince-style emails of the early 2000s, these emails are very deceptive, realistic looking, and...

Subscribe to Read More

Are You an Educator?

Get Free online access to all our
news and resources and get
eCampus News Today email newsletter

About the Author:

Josh Gatka has worked in Hyland’s research and development department for four years. In 2016, he assumed the role of security evangelist, a position dedicated to educating industry professionals about ways to protect themselves and their organizations from advanced cyber threats.