Managing threat detection for my aunt’s websites

My Aunt Mazie is a pretty cool old lady.

She writes mysteries and romance novels under a couple of different pen names.

I have sworn not to reveal her pseudonyms, but trust me you have definitely heard of both of her alter egos before. Anyway, she has very few people she trusts with her secret — heck, her own family doesn’t even realize she is rich and famous – so she entrusted me to run her websites for her. She has two domains, one for the romance author and one for the mystery writer. She has no idea how cybersecurity works, but she understands all too well how important it is, not just for identity but her money, too! A lot of people think that this sort of thing begins and ends with firewall protection, or maybe a VPN service to keep a low profile. The truth is that if a hacker specifically targets you, then you will need high quality tech, encryption key management, operating system security, and more to keep yourself safe. People don’t want to hear this, but the best form of cybersecurity is anonymity. If you live in a nice neighborhood and drive a junky car, you don’t need the high quality of system security for it, because it won’t be targeted. But having a nice car draws thieves, and having a popular, lucrative website will require threat detection and strong cybersecurity. I am not strong enough of a coder to handle it all, so I work for my Aunt Mazie and a cybersecurity solutions company to manage her sites.


Operating system security