Skip to main Content
Video

Cybersecurity Myth Busters

Global Knowledge
  • Date: 06 September, 2021

Global Knowledge instructor and Cybersecurity Expert James Michael Stewart, who has been teaching job skill and certification courses for over 20 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+, explores in the video's below common myths of cybersecurity and the truth behind each myth.

My Password is Too Strong for Attackers

While having a strong password can help keep most bad actors out, it may not keep all out. In this video, James talks about the ways attackers may take advantage of the shortcomings of password authentication and how to avoid becoming a victim.

The cyber myths debunked in this video:

- My password is too strong for an attack

- I’m not important enough to attack

Cyber Attacks Only Come From Outside Sources

It’s hard to believe that attacks may come from internal sources; for some, it’s the last place they’d expect. But, unfortunately, attackers may be closer than you think. James covers a few examples of security incidents from internal sources and the ways to prevent them.

The cyber myths debunked in this video:

- I can always spot or recognise an attacker or a breach

- We've not been breached before, so our security plan is good enough for the future

- I use security products, so I don't have anything to worry about

Social Media: My 'Friends' Wouldn't Scam Me

“We’re friends, right? My friends wouldn’t try to scam me.” In this video, James breaks down the various ways attackers can use a person’s friends list on social media to gain access to sensitive information.

The cyber myths debunked in this video:

- Those I know through social media can't hurt me

- I only visit common websites, so I'm safe

- I can always spot a scam because they are obvious

Browse Related Brands:
Browse Related Topics:

James Michael Stewart

James Michael Stewart has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. He has been teaching job skill and certification courses for over 20 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. James Michael Stewart is an author on the CISSP Study Guide 8th Edition and the author of Security+ Review Guide 4th Edition (SY0-501) and has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael holds variety of certifications, including: CISSP, CEH, CHFI, ECSA, and Security+. His computer knowledge is self-acquired, based on seat-of-the-pants hands-on “street smarts” experience.

Cookie Control toggle icon