Every day should be Computer Security day

Happy Computer Security Day! Since its inception in 1988, Computer Security Day has been celebrated annually on the 30th of November, but we’ll forgive you if you’ve never heard of it.

Where did computer security come from?

In the late 1980s, computers were growing rapidly in popularity, but there was a long way to go before they became the common household item they are today. Technology has changed considerably over the years but one thing that remains the same is the threat of hackers and viruses that have been around since the Commodore 64.

With more sensitive data stored online than ever before, there is an even greater need to ensure that effective security measures are in place as the vulnerability of individuals continues to grow as the most appealing targets for hackers.

A quick Google search generates multiple results for Computer Security Day, yet the only recent example of an associated activity was in Mauritius in 2016. Despite the ever-growing need for cybersecurity awareness, the day has been lost in our calendars and overtaken in popularity by the likes of International Chihuahua Appreciation Day (May 14th in case you’re wondering). While nobody can argue that Chihuahuas shouldn’t be given a day of appreciation, cybersecurity deserves a place in our diaries too.

Cybersecurity deserves our appreciation too

For World Book Day, schools celebrate the occasion with children dressing up as their favorite characters and receiving book tokens to encourage them to read. There’s no reason why Computer Security Day couldn’t be celebrated in a similar fashion; as the world becomes ever more digitized, online safety is vital.

With homework now being set online and communication with pupils taking place over email, schools should use the event as a way to educate students. Children will not only need to be aware of cybersecurity in school but in their daily lives beyond education, therefore educating them on the essentials of staying safe online will set them up for life.

The day should be treated as an opportunity to run workshops or encourage students to explore career options in tech. Security organizations should come in and speak to children about how they can help to keep the hackers at bay, run workshops, and take part in important security conversations so the event would be properly commemorated rather than forgotten.  

Cybersecurity isn’t a one-day-only event

If just one of the 365 days of the year is to be dedicated to cybersecurity, organizations and governments should take the opportunity to celebrate the event, and take meaningful steps to improve cybersecurity awareness and practice within their spheres of influence.

It could be as simple as businesses getting their employees to check that they are complying with company security policy, or even better, the government could provide online resources much like educative guides provided by the National Protective Security Authority (NPSA), among others. If even one day of education was set aside by the Government to provide people with the knowledge needed to protect themselves, people would be encouraged to build positive habits online and be able to prevent the unnecessary damage that can be caused by hackers.

However, cybersecurity is not something that can be reserved for a single day of the year and forgotten about the next: people need to consider how they operate online all year long. Hackers continue to grow more sophisticated and new threats appear daily, so security is something that needs to be considered constantly.

Where Computer Security Day has become lost and forgotten, cybersecurity as a whole mustn’t suffer the same fate. Actions must be continuously repeated for them to become a habit, so perhaps setting time aside each and every day to check security methods would ensure a safer internet landscape.

Computer Security Day should be an important reminder

A single day of computer security seems hardly enough to combat the growing number of potential threats but any day that encourages people to consider their safety should be celebrated. Computer Security Day should be treated as a reminder, to check what protection you have in place and educate yourself about what you can do to improve. By learning positive online habits, cybersecurity day can be every day.

To find out more about how Red Sift’s integrated cloud email and brand protection platform can help you make a start, feel free to get in touch with us!

Get in touch


Clare Holmes

30 Nov. 2018



Recent Posts


Red Sift Recognized on Deloitte’s EMEA Fast 500™ List

Francesca Rünger-Field

We’re thrilled to share that Red Sift has been included in Deloitte’s 2023 EMEA Fast 500 list. This recognition stems from 389% revenue growth over three years, $54 million in Series B funding, acquiring ASM innovator Hardenize, and introducing the Red Sift Pulse Platform. Read the press release here. About the award The Deloitte Technology Fast…

Read more
Brand Protection

The vital role of cybersecurity for Nonprofits: A deep dive 

Sean Costigan

Save the Children, a beacon of hope and change, has been dedicated to improving the lives of children for over a century. Founded in London, it now has a presence in 29 nations, employing 844 staff members in the UK alone and engaging over 3600 formal volunteers. As charities and nonprofits like Save the…

Read more

Red Sift brings DMARC data to the SOC with new Cisco XDR…

Rebecca Warren

Today, we’re thrilled to announce that we’re extending our partnership by joining the Cisco Security Technical Alliance and integrating Red Sift OnDMARC with Cisco XDR. This integration builds on the Domain Protection partnership we announced in November 2023 to bring visibility of business email compromise into the SOC (security operations center). At release, Red…

Read more

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more