Every day should be Computer Security day

Happy Computer Security Day! Since its inception in 1988, Computer Security Day has been celebrated annually on the 30th of November, but we’ll forgive you if you’ve never heard of it.

Where did computer security come from?

In the late 1980s, computers were growing rapidly in popularity, but there was a long way to go before they became the common household item they are today. Technology has changed considerably over the years but one thing that remains the same is the threat of hackers and viruses that have been around since the Commodore 64.

With more sensitive data stored online than ever before, there is an even greater need to ensure that effective security measures are in place as the vulnerability of individuals continues to grow as the most appealing targets for hackers.

A quick Google search generates multiple results for Computer Security Day, yet the only recent example of an associated activity was in Mauritius in 2016. Despite the ever-growing need for cybersecurity awareness, the day has been lost in our calendars and overtaken in popularity by the likes of International Chihuahua Appreciation Day (May 14th in case you’re wondering). While nobody can argue that Chihuahuas shouldn’t be given a day of appreciation, cybersecurity deserves a place in our diaries too.

Cybersecurity deserves our appreciation too

For World Book Day, schools celebrate the occasion with children dressing up as their favorite characters and receiving book tokens to encourage them to read. There’s no reason why Computer Security Day couldn’t be celebrated in a similar fashion; as the world becomes ever more digitized, online safety is vital.

With homework now being set online and communication with pupils taking place over email, schools should use the event as a way to educate students. Children will not only need to be aware of cybersecurity in school but in their daily lives beyond education, therefore educating them on the essentials of staying safe online will set them up for life.

The day should be treated as an opportunity to run workshops or encourage students to explore career options in tech. Security organizations should come in and speak to children about how they can help to keep the hackers at bay, run workshops, and take part in important security conversations so the event would be properly commemorated rather than forgotten.  

Cybersecurity isn’t a one-day-only event

If just one of the 365 days of the year is to be dedicated to cybersecurity, organizations and governments should take the opportunity to celebrate the event, and take meaningful steps to improve cybersecurity awareness and practice within their spheres of influence.

It could be as simple as businesses getting their employees to check that they are complying with company security policy, or even better, the government could provide online resources much like educative guides provided by the National Protective Security Authority (NPSA), among others. If even one day of education was set aside by the Government to provide people with the knowledge needed to protect themselves, people would be encouraged to build positive habits online and be able to prevent the unnecessary damage that can be caused by hackers.

However, cybersecurity is not something that can be reserved for a single day of the year and forgotten about the next: people need to consider how they operate online all year long. Hackers continue to grow more sophisticated and new threats appear daily, so security is something that needs to be considered constantly.

Where Computer Security Day has become lost and forgotten, cybersecurity as a whole mustn’t suffer the same fate. Actions must be continuously repeated for them to become a habit, so perhaps setting time aside each and every day to check security methods would ensure a safer internet landscape.

Computer Security Day should be an important reminder

A single day of computer security seems hardly enough to combat the growing number of potential threats but any day that encourages people to consider their safety should be celebrated. Computer Security Day should be treated as a reminder, to check what protection you have in place and educate yourself about what you can do to improve. By learning positive online habits, cybersecurity day can be every day.

To find out more about how Red Sift’s integrated cloud email and brand protection platform can help you make a start, feel free to get in touch with us!

Get in touch

PUBLISHED BY

Clare Holmes

30 Nov. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Winter wins: Red Sift OnDMARC wraps up 2024 as a G2 DMARC…

Francesca Rünger-Field

The season of giving has brought us another reason to celebrate! Red Sift OnDMARC continues its winning streak in G2’s Winter 2025 report, earning Leader status in the DMARC category for another consecutive season. This recognition reflects our strong market presence and the unwavering satisfaction of our customers. Cheers to wrapping up 2024 on…

Read more
AI

Text classification in the age of LLMs

Phong Nguyen

As natural language processing (NLP) advances, text classification remains a foundational task with applications in spam detection, sentiment analysis, topic categorization, and more. Traditionally, this task depended on rule-based systems and classical machine learning algorithms. However, the emergence of deep learning, transformer architectures, and Large Language Models (LLMs) has transformed text classification, allowing for…

Read more
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more