{"id":1964,"date":"2008-02-16T01:56:44","date_gmt":"2008-02-16T05:56:44","guid":{"rendered":"http:\/\/www.markbaker.ca\/blog\/2008\/02\/16\/untangled\/"},"modified":"2022-02-10T10:53:49","modified_gmt":"2022-02-10T14:53:49","slug":"cyber-security-importance","status":"publish","type":"post","link":"http:\/\/www.markbaker.ca\/blog\/2008\/02\/cyber-security-importance\/","title":{"rendered":"Cyber Security Importance"},"content":{"rendered":"<img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/content\/en-global\/images\/repository\/isc\/2017-images\/What-is-Cyber-Security.jpg\" alt=\"cyber security\" width=\"750\">\nHaving your network hacked can put you out of business. However remote <a href=\"https:\/\/blog.consoleconnect.com\/all-you-need-to-know-about-peering\">peering<\/a> allows a business to access internet exchange points worldwide, providing higher bandwidth options as well as delivering faster network speeds, greater security and lower latency. That&#8217;s why security projects and this blog are being established. We urge everyone who reads this post to help us make this happen. All we ask is that you help us &#8220;use our tools&#8221;. Please help us by helping us to spread the word about this online data breach in order to get the word out to the public. The longer we can stay &#8220;out in the dark&#8221; and in the shadows, the more of a real threat this is, so using measures as VPN can be helpful, and you can find out the\n<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-a-vpn\">VPN meaning<\/a> online here. You may also visit sites like <a href=\"https:\/\/www.venyu.com\/disaster-recovery-services\/\">http:\/\/www.venyu.com\/disaster-recovery-services\/<\/a> for additional security and protection.\n\nIf you know of any other cyber security stories that you feel should be highlighted on this blog please email me at:\nNoticing some strange things in this email? You should receive a follow up from my regular email, so be sure to check it out, often times I&#8217;ll try to get you involved in some way.\n\nAnd, if you&#8217;re into why I&#8217;ve been active with this blog over the years, here&#8217;s an article about this blog I wrote for PC Magazine. This article was written back in 2004, but I feel it still holds true today. As always, thanks for reading, we appreciate the support.\n\nIf you&#8217;re interested in more about this cyber security project, you can visit the site at:\nI&#8217;ve got a few updates on this website! The pages that you see below have been updated.\nFor those of you who are interested in downloading my latest study for a good cause, here&#8217;s where you can buy it:\nI&#8217;ve recently been on a global speaking tour, giving my thoughts on your day to day transactions with me and fellow cyber security expert Charlie Miller. As I am doing these presentations, I will have the links to purchase my study for you at the bottom of my slides. Click here for the list of my selected areas. Here&#8217;s a summary of the information presented in each portion of my presentation:\n3 Ways to Prevent and Repair Computer Disasters\nMy predictions for the 21st century and 21st century cyber security\nCyber Security Myth Busting  Part 1  What Really Happens?\nCyber Security Myth Busting  Part 2  Bad or Broken?\nCyber Security Myth Busting  Part 3  How do We Get It Right?\nSecurity Analysis  the tools that keep my fellow security analysts up at night\nWe have an amazing client whose operation is as critical as the country&#8217;s $2.3 trillion GDP. The nation will be destroyed if we don&#8217;t track down the culprits and shut the malicious network down. It will not be our legacy. This is a warning to all in this industry.","protected":false},"excerpt":{"rendered":"Having your network hacked can put you out of business. However remote peering allows a business to access internet exchange points worldwide, providing higher bandwidth options as well as delivering faster network speeds, greater security and lower latency. That&#8217;s why security projects and this blog are being established. We urge everyone who reads this post [&hellip;]","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[22],"class_list":["post-1964","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-rest"],"_links":{"self":[{"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/posts\/1964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/comments?post=1964"}],"version-history":[{"count":0,"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/posts\/1964\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/media?parent=1964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/categories?post=1964"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.markbaker.ca\/blog\/wp-json\/wp\/v2\/tags?post=1964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}