Previous All Posts Next

How Cybersecurity Experts Find the Bad Guys Online

Posted: August 23, 2023 to Cybersecurity.

Tags: AI, Data Breach, Malware

Finding Computer Bad Guys: Imagine you're in a big city. You can tell who the tourists are because they always look up at the tall buildings, right? Well, just like those tourists, there are "bad guys" on computers who do things that make them easy to spot.

How to Catch a Computer Tourist

Just like we spot tourists looking at big buildings, computer experts can see when someone is trying to sneak into a computer. These sneaky moves can mean that someone is trying to steal information.

Last month, a group called Cisco Talos said that more bad guys are trying to sneak into computer systems. But, if we can spot these "tourists" early, we can stop them.

Think about it like this: If someone was sneaking around your house, how fast could you catch them?

Computer Maps for Bad Guys

When people visit a new city, they use maps to find their way. In the computer world, bad guys try to find their way around too. A company called Thinkst has made special alarms, called "canaries," that let us know when someone is sneaking around.

These "canaries" are like invisible tripwires. When a bad guy trips them, they send out a warning. Thinkst has many types of these alarms, like ones that tell you if someone is looking at certain websites or opening certain files.

The "Don't Touch" Sign for Computers

Haroon Meer, who started Thinkst, says that these canaries are like "wet paint" signs. Just like some people touch wet paint even when the sign tells them not to, bad guys can't help but touch these computer tripwires.

Also, these alarms are good for testing our own computer defenses. Some experts try to sneak into systems on purpose to find weak spots. These alarms can catch them too.

Thinkst also has a special tool with even more alarms. And the best part? They made it easy to use!

Free Canaries for Everyone!

Thinkst is giving away some of their alarms for free. You can visit canarytokens.org and pick the ones you like. There are many types:

  • Alarms for when someone looks at certain websites.
  • Alarms for when someone uses a special key.
  • Alarms for when someone opens certain files.

And more!

Haroon from Thinkst says that these alarms are very good at catching sneaky people. And they're good for testing our own computer guards too.

In the end, it's like a game of hide-and-seek. The bad guys try to sneak around, but with the right tools, we can catch them quickly. Just like we can spot a tourist in a big city, we can spot a sneaky person in the computer world!

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now