Recent comments in /f/IAmA

AutoModerator t1_iv3tyjp wrote

u/sharablebanese, PLEASE READ THIS MESSAGE IN ITS ENTIRETY BEFORE TAKING ACTION. ALL AMAs REQUIRE PROOF

Please review our guidelines on what is acceptable as proof.

If you intend to submit public proof, please edit a link to your proof into your current post and message the moderators by clicking here. This must be proof a reasonable person believes verifies your claims. The mods strongly encourage you to provide public proof.

If you absolutely cannot provide public proof, you can work with the moderation team to confidentially verify proof of your topic or subject. Remember: Mod verification requires unequivocal proof. For information on how to submit confidential proof, please click here. Please keep in mind it may take substantially longer to approve confidential proof compared to public proof.

If your topic cannot be proven, it may not be appropriate for this subreddit. Please review our rules and FAQ: https://www.reddit.com/r/iama/wiki/index

If you believe you have received this message in error or have another question - please message the mods by clicking here.


I am a bot, and this action was performed automatically. Please contact the moderators of this subreddit if you have any questions or concerns.

1

___Tom___ t1_iv02yu9 wrote

Not OP, but my company is looking, so: The right mindset. Skills can be acquired. But dealing with an intelligent, intentionally acting adversary is fundamentally different from dealing with technical failures, environment events or simple system behaviour. This is also where in the training scenarios I sometimes run most companies fail. They can handle a fire, a DDoS attack, a malware outbreak - but they can't handle a hacker who will pivot and react to whatever you're doing. Having a basic grasp of what it means to be under attack is essential.

1

___Tom___ t1_iv02neg wrote

Second that. Some of the world-class people I'm lucky to know in the field have no formal qualifications. However, many of them are (like myself) dinosaurs from a time when there was no "IT Security" study. You'd study something with IT and then pivot into security. These days, qualifications are getting more important, but everywhere I've worked within the past 10 years people were still open for lateral entrants.

1

___Tom___ t1_iv0285a wrote

Not OP, but IMHO the single best thing you can do is to not re-use passwords. Use a different password for every website you have an account on, because password leaks are common and your username is often your e-mail these days, and hackers will take a leaked password database and try those e-mail/password combinations on other sites, especially social media, gmail, and others that offer SSO ("log in with Facebook/GMail/Github/etc")

2