Cyber Security as an immediate National Threat


Cyber Security as an immediate National Threat

Just a few years ago, as Russia invaded Georgia, (no, not the American peach state, but a country in Eurasia) Russia coordinated with hackers to take down Georgia’s internet, telecommunications, and cut Georgia off from the outside world. The hackers did a pretty good job. The loss of communications left Georgia’s military forces blind in shambles and the people unable to seek international aid while Russian forces took over.

Every American company and institution present on the internet fight off cyber attacks daily. These ruthless attackers adapt as fluidly as we learn and establish firewalls and intensify internet security. Our nation is actively engaged in a continuously escalating cyber cold war against independent and nation-state hackers.

National Cyber Security isn’t just about setting up “firewalls” and cybersecurity systems. National Cyber Security also about establishing real-world infrastructure immune to the virtual world.

Real Security requires a cyber to real-world manual override for all key infrastructure systems.

Foreign Nation States require a clear understanding that the United States shall hold the offending nation accountable for the unrestrained hackers of their land, with clearly defined consequences.

Just as we have a Second Amendment providing individuals the right to protect themselves, organizations require the right to take appropriate actions to protect themselves online. We shouldn’t have to wait helplessly for Anonymous take cyber offenders down.

Nat Knows: After Nat request voter files directly from county elections clerks throughout the country, Nat was shocked to receive a county voter file that mistakenly included drivers license numbers. On another occasion, while Nat worked in a HIPPA complaint company, a stack of folders was left on top of a shared desk for an extended time. Nat opened the abandoned folders to find the outsourced Cloud company left behind its list of clients, passwords, and private data. Gaps in security are endless. Natalie Fleming gets it.

Related Articles