Skip to content

The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maroño

Humans, by nature, are complex creatures resistant to change and education. 

Dr. Abbie Maroño explains that the struggle lies not only in our cognitive limitations but also in our emotional makeup. Overcoming these barriers requires motivation, passion, and consistency—qualities that are not always easy to foster.

In a fascinating dive into the intricacies of human behavior and social engineering, Dr. Abbie Maroño shares her journey into psychology, sparked by a youthful curiosity and an early commitment to research. Her path from academia to applying her expertise in the private sector demonstrates her strong commitment to understanding human dynamics, particularly its intersection with cybersecurity.

In the context of social engineering, this article highlights the powerful influence of group dynamics and the principle of social proof.

The interview’s highlights

  • Educating humans is challenging. Success in educating humans hinges on motivation due to our natural resistance to change and limitations in memory and cognitive capacity.

  • Embracing shame for personal growth. Dr. Maroño’s work suggests that acknowledging and understanding shame can catalyze deep personal development, challenging the notion that shame should be entirely dismissed.

  • Group dynamics’s role in social engineering. Cybercriminals exploit social proof and our propensity to follow the crowd. Awareness and resistance are key to safeguarding against these tactics.

  • Real-world cybersecurity training is crucial. Dr. Maroño advocates for simulation-based training over traditional methods, particularly in sectors like healthcare, to make learning more relevant and effective.

  • The power of self-relevance in learning. Effective education requires making cybersecurity personally relevant, using real-world simulations to improve engagement and practical application.

  • “Trust but verify” enhances cybersecurity. Emotional intelligence and critical thinking are vital in defending against manipulation, emphasizing a balanced approach to trust.

Key insight #1: motivation and engagement are crucial for effective learning.

NordLayer: Abbie, you’ve been studying human behavior for a while now. What’s your conclusion? Are humans easy to train and educate by nature?

Dr. Abbie Maroño: No, human beings are not easy to educate. The memory system is very prone to errors, and we have a limited cognitive capacity. No doubt, we have the ability to be educated, but it really depends on a ton of different factors.

Educating someone against their will, especially in areas like security practices, is ineffective. For learning to be effective and for information to transition into long-term memory, the learner must be engaged and attentive.

Without motivation, information will likely enter one ear and exit the other. This is supported by research indicating that mere exposure to information is insufficient for learning—attention to the material is essential.

Quote 1

However, learning becomes much more attainable if there is motivation, passion, and dedication. The concept of ‘cramming’ before an exam illustrates this well. It’s a widespread belief that we can quickly absorb information, but the reality is that both the brain’s short-term and long-term memory functions require time and consistency to learn truly.

Key insight #2: Group motivation and social proof influence individual decision-making in social engineering contexts.

NordLayer: Speaking of motivation—personal or collective motives—can bring better learning experiences and results?

Dr. Abbie Maroño: While individual self-interest can drive motivation, the presence of group motivations can significantly amplify it.

Being part of a team with shared goals fosters a sense of responsibility and accountability, much like the dynamic observed in programs like Weight Watchers. Despite criticisms of Weight Watchers for its food quality and the psychological implications of its “sins” concept, the program’s success is attributed to the strong social support and collective mindset it promotes.

This group cohesion encourages individuals to stay committed to their goals, as the sense of being observed and held accountable by peers increases their motivation to maintain progress.

NordLayer: How do peers (a group) influence an individual’s decision-making in the event of social engineering?

Dr. Abbie Maroño: Social proof influences our decisions by making us more likely to trust or choose something endorsed by others. This tactic is frequently utilized by social engineers, who manipulate appearances to blend in or create false endorsements, leveraging our tendency to trust familiar figures or the majority.

Quote 2

For instance, mentioning a known colleague like Sally from accounting in a story can foster trust by association. This principle is also why celebrity endorsements and the phenomenon of joining a queue at a busy restaurant work effectively.

Key insight #3: embracing and understanding shame is essential for genuine personal growth instead of eradicating it for the narrative of mental health and empowerment.

NordLayer: As a published author, your latest book explores personal improvement through shame. Can you tell us more about the premise of this approach?

Dr. Abbie Maroño: My first book will officially be released in July, though I’ve already been sharing it with select individuals and doing book signings. My second book is set to come out in December.

I started writing this self-help book, “Work in Progress,” because I noticed a significant need for a deeper understanding of our emotions. Many self-help books and popular media, though well-intentioned, lack a scientific approach and often suggest that we must rid ourselves of shame to achieve good mental health and empowerment.

However, this doesn’t align with the complex nature of the human brain or how we actually process emotions. Our brain, which is a significant energy consumer despite its small size, doesn’t generate emotions without reason. Emotions are signals, meant not always to be acted upon but to inform us. Dismissing shame overlooks a crucial aspect of our emotional well-being and self-awareness.

Quote 3

My aim was to create a book that’s honest, raw, and relatable, challenging the overly optimistic narrative that “everything will be fine” with a more grounded, realistic approach to personal development.

Key insight #4: cybercriminals manipulate nonverbal cues to scrutinize first impressions.

NordLayer: In your Forbes article, you said that certain social skills can help people elicit the information they want. What are these skills, and how do cybercriminals use them?

Dr. Abbie Maroño: Cybercriminals exploit nonverbal communication to manipulate perceptions, leveraging our instinctual habit of making rapid judgments about people’s personalities based on their appearance and behavior, a process known as “thin slicing.”

This evolutionary trait, which helped our ancestors quickly assess threats, today leads us to assign traits like friendliness or competence based on superficial cues like smiles or confident demeanor, often without any supporting evidence.

Quote 4

Cybercriminals use this knowledge to their advantage, presenting themselves as authoritative and trustworthy to bypass our defenses.

Our reluctance to revise first impressions makes us vulnerable to such manipulation, as we seek to validate our initial judgments rather than question them. Thus, understanding and being aware of these cognitive biases can help us better defend against the tactics of social engineers.

Key insight #5: emotional awareness is critical in resisting manipulation by social engineers and making more informed decisions.

NordLayer: Can you share what personality traits and psychological defenses should be nurtured to resist social engineering attempts?

Dr. Abbie Maroño: General emotional awareness in cybersecurity, explaining how social engineers exploit emotions to manipulate their targets, is important.

Recognizing when emotions like fear or anger influence decisions is crucial, as these emotions can cloud judgment and lead to quick, unthoughtful actions.

Quote 5

For example, taking a moment to breathe and assess one’s feelings before reacting to a potentially malicious email can allow the brain’s logical centers, like the prefrontal cortex, to engage and evaluate the situation more critically. This approach is vital because, despite the sophistication of attacks, the final decision to engage (e.g., clicking a link) rests with the human user.

Beyond technical measures, fostering a security mindset that includes emotional regulation and awareness is key. This not only helps individuals resist manipulation but also adapts to evolving threats, emphasizing the role of human judgment in cybersecurity defenses.

Key insight #6: effective cybersecurity training requires real-world simulations and engagement.

NordLayer: Let’s explore dynamic and sensitive environments like healthcare where cybersecurity awareness is crucial, but there’s no time to train and educate specialists. What human behavior traits and social engineering tactics could be exploited to achieve positive learning results?

Dr. Abbie Maroño: Learning is most effective when information directly relates to the individual.

Traditional security training, like online videos, often fails to engage healthcare professionals because it lacks this personal relevance and fails to bridge the gap between theoretical knowledge and practical application.

Quote 6

This approach not only identifies vulnerabilities but also personalizes the learning process, making it more impactful. By engaging employees in scenarios like simulated phishing (vishing and smishing) attacks, they learn to recognize and react to threats more effectively.

Positive behaviors are reinforced, while areas for improvement are identified and addressed. It is important to invest in comprehensive security training to protect sensitive information proactively, warning that the costs of inadequate training far outweigh the investment in robust, interactive learning experiences.

Key insight #7: “trust but verify” ensures safety in cybersecurity by combining trust with critical verification of requests.

NordLayer: What benefits should be amplified, and what behaviorist tactics should be used to help people become more aware of cyber threats? What should be included in the cybersecurity training, in your opinion?

Dr. Abbie Maroño: Tactics like “trust but verify” emphasize the balance between maintaining trustful relationships and being cautious.

Quote 7

This method allows for cooperative relationships to flourish while safeguarding against manipulation. Verification becomes a critical step in this process, ensuring that one does not blindly fulfill requests without appropriate scrutiny.

Such an approach relies heavily on emotional responses and critical thinking to discern the legitimacy of requests, advocating for a balanced stance of trust with a readiness to verify, avoiding the pitfalls of unwarranted suspicion.

Thank you.

Dr. Abbie Maroño’s passion for understanding human behavior ignited at 17, leading her from early research endeavors in university to a fulfilling career in academia and, ultimately, into the private sector.

Dr. Maroño’s work reveals the intricate dance between human psychology and cybersecurity, highlighting the need for an empathetic, informed approach to educating and protecting against cyber threats. Her emphasis on emotional awareness, group influences, and innovative training methods offers a fresh perspective on building resilient cybersecurity defenses rooted in understanding human nature.

How NordLayer can help

NordLayer can significantly enhance an organization’s cybersecurity posture by fostering a culture of “trust but verify” within the workplace.

NordLayer empowers employees with the tools and knowledge necessary to scrutinize and validate requests, thus minimizing the risk of social engineering attacks. Its advanced security solutions, designed to address the nuanced challenges discussed, such as the need for emotional awareness and critical thinking, provide a robust framework for organizations to protect their sensitive data.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Juggling security: How many passwords does the average person have in 2024?

For nearly four years, the magic number in every cybersecurity expert’s mind was 100 – the average number of passwords a person handles. During the pandemic and following a boost in hybrid work and digital communication, our usage of digital spaces has only expanded. It’s time to look at the newest numbers: How many passwords does the average person have in 2024?

A survey conducted by NordPass in 2024 revealed a rapid growth in password usage for personal purposes, with an increase of nearly 70% in just over three years. According to the latest data, the number is now 168. For the first time, the survey also recorded the average number of passwords used for business-related accounts: 87. Let’s take a closer look at the research and learn what this increased number of passwords means for our online safety.

The upward-pointing trend

NordPass has been tracking password usage statistics since 2020. The first survey was conducted in February of that year, just a month before the start of the COVID-19 pandemic. It was reported that an average user handled around 80 passwords at that time.

The follow-up survey was conducted in October of the same year. Eight months into the pandemic, the uptick in password handling was already evident. The average number of passwords handled by a person went up 25% to the number cited since – 100.

As stated by Tomas Smalakys, CTO at NordPass, COVID was perceived as the main cause at the time, as people were staying indoors and handling all processes – from shopping to medical appointments – online.

However, a lot has changed in four years, and the rapid increase in digital accounts we handle now goes beyond the life rhythm of lockdowns. According to Smalakys, “the amount of accounts that people hold gets higher every year. Multiple factors come into play – new services get launched, new shops are opened.”

As the scope of digital services increases, so does the number of accounts users handle. Naturally, the latest password statistics reflect this. It’s important to note that the numbers don’t just consider active or frequently used accounts. In fact, many accounts remain dormant as users forget about them and don’t delete them even if the accounts are no longer needed.

First insights into business password handling

For the first time, the 2024 NordPass password survey also researched work-related password usage. It was revealed that the average number of passwords per person in the workplace is 87.

While this is a new index for the NordPass survey, we can assume that the number of accounts required for work has seen a similar upward trend in recent years as remote and hybrid work opportunities have become increasingly popular.

Adding the number of personal and business passwords together brings the total to 255. Juggling that many passwords can be problematic in terms of both security and convenience.

Methodology: The new quantitative research by NordPass was conducted on March 4-15, 2024, and surveyed 1,509 NordPass users.

What happens when you have too many passwords to remember?

The problem with handling so many accounts on average is that they aren’t equally important to a person. In fact, many accounts are abandoned or forgotten after a handful of visits. This can pose a serious security risk, as users may overlook data breaches and not realize their accounts have been compromised.

Managing hundreds of accounts can be a tedious job that not all users are willing or able to do. The trend points toward people hoarding their online accounts and forgetting to review and close accounts they don’t use as frequently or no longer require. In many cases, breaches are overlooked, as the users simply forget they have accounts on breached platforms.

Another issue concerns the reuse of passwords. With nearly 200 accounts to manage, creating and then remembering a unique password for each one can seem impossible. This leads to people reusing the same or similar passwords for different accounts to simplify logging in. For example, they may reuse the same word or phrase, adding a single number, capital letter, or special symbol if required for security purposes.

This opens up multiple accounts to vulnerabilities. For example, if one account is breached, all accounts using the same password and owned by that user are at risk. Abandoned accounts on rarely visited platforms with weaker security measures can become the prime target for cybercriminals.

The threat increases if people reuse the same credentials for both personal and work accounts. A breach of a personal account could potentially affect the company’s security as well. According to the 2023 Data Breach Investigations Report, stolen credentials were among the top three main methods of accessing an organization, followed by phishing and vulnerability exploitation. Password mismanagement and vulnerabilities pose risks ranging from loss of access to financial damages or identity theft.

What can you do to handle passwords easier?

You might be thinking about how many accounts you currently have and how many may use insecure passwords. To make your credentials management less overwhelming, here are some best practices you can follow to reduce the number of passwords used in your daily life:

  • Deactivate unused accounts. Considering how many passwords the average person has, tracking down every unused account you’ve created may be difficult. However, if you know for certain that you no longer need an account, deactivate it to reduce your password load.

  • Set up a password manager. As you work to reduce the number of accounts you own, you will encounter many that remain necessary. NordPass helps individuals and businesses manage their passwords with ease and security in mind. Its built-in features support generating unique and secure passwords, simplifying logging in with autofill, and accessing all sensitive data on desktop and mobile devices as well as major browsers.

  • Regularly update your credentials. The longer you use a password, the higher the chances of it being breached. If you regularly change your passwords, you keep your accounts safer. Password Health lets you see which of your login credentials are weak, old, or reused.

  • Make sure all passwords are strong. We recommend passwords be at least 20 characters long and contain a combination of letters, numbers, and special symbols. A password generator helps quickly create passwords that meet this criteria. For more tips on creating strong passwords, visit our dedicated blog post.

  • Stay ahead of breaches. Use the Data Breach Scanner to get real-time alerts if your passwords, email addresses, or credit card details have appeared on the dark web.

  • Enable multi-factor authentication (MFA). Add an extra layer of protection to your accounts and ensure that even if your password is compromised, cybercriminals cannot access the affected account.

  • Switch to a passwordless solution where possible. Passkeys are a new, more secure way of logging in to your accounts. They use a combination of biometric verification with cryptographic keys, offering a safer and more convenient alternative to passwords. NordPass lets you easily store and manage passkeys on different devices.

Whether you have 18 or 168 passwords, NordPass makes password management simple and convenient. Your passwords, passkeys, credit card details, and other sensitive information are protected in the xChaCha20-encrypted vault, which only you can access.

NordPass offers a range of features tailored for personal and business use, including Email Masking, passkey support, secure item sharing, centralized policies for companies, and an Activity Log. You can try NordPass Free and Premium for your personal use or sign up for one of the Business plans based on your organization’s needs.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Understanding the difference between observability and monitoring

Knowing your network helps ensure availability, protect data, and fix technical issues. But what techniques should companies use to understand network performance? This blog will look at two popular solutions: observability and monitoring.

Observability and monitoring have similar goals. Both solutions capture network data and help diagnose problems. However, they use different techniques to achieve this goal. And while comprehensive observability platforms may suit some businesses, they will be too complex for others.

Read on to learn how observability and monitoring work, their strengths and weaknesses, and how to choose the best network analysis tools.

Key takeaways

  • Observability vs. monitoring: they are both network visibility solutions that capture network data and diagnose issues. Observability platforms offer comprehensive insights into the internal state of systems. Monitoring tools are less complex, using predefined metrics and thresholds to assess network health.

  • When to use each: Observability systems enable flexible, interactive analysis, and monitoring tools are more rigid and rely on predetermined metrics. Observability tools provide deep insights into network behavior, while monitoring offers less detailed feedback. However, monitoring delivers instant insights and alerts. Observability tools take a slower, more analytical approach.

  • The criteria for choosing observability and monitoring: companies must assess specific needs and budget constraints. Observability platforms offer in-depth insights into complex technical challenges. They are ideal for distributed systems. Monitoring solutions provide real-time updates and alerts to enhance security and meet compliance goals.

  • Telemetry and Application Monitoring (APM) are closely related visibility concepts. Telemetry uses distributed protocols to track network activity and performance. APM monitors specific applications, using dedicated dashboards, metrics, and logs to present alerts and reports.

What is monitoring?

Monitoring involves collecting and analyzing information to understand the progress of a project or performance within an IT environment. We use monitoring to assess whether projects are meeting core objectives. Monitoring tools inform the decisions of managers. They enable teams to stay on track and adapt to changing circumstances.

Monitoring uses metrics to capture information. These metrics are quantitative data measurements representing IT infrastructure or program performance. For example, monitoring metrics may include data collection about server request response rates. Metrics might also capture Central Processing Unit (CPU) and network load levels.

Components of monitoring systems usually include:

  • Storage: Logging metrics in inaccessible and standardized formats.

  • Aggregation: collecting data in relevant clusters or databases.

  • Visualization: presenting logging data in a usable form for analysis and decision-making.

  • Automation: scheduling automatic responses to monitoring outputs.

What is observability?

Observability is the ability to understand the internal state of systems to assess performance and make necessary changes. For example, cloud-native observability tools identify security vulnerabilities and track system performance in multi-cloud settings.

Observability is a design principle that informs IT deployments. An observable system enables monitoring and analysis. Engineers build networks with observation in mind, making it easier to maintain assets and make network changes.

At the same time, observability is an operational goal. Thanks to observability systems, managers can understand the context in which problems arise and take remedial action.

IT teams use observability tools to gain insights into the health of assets across an enterprise network. Algorithms derived from control theory enable tools to establish and understand relationships between data centers, on-premises assets, cloud deployments, and remote devices. Tools use “three pillars” to observe and report on system health:

  • Logs: text or numerical records of activity occurring within an IT system. Logs track what happened and when it happened. Logs may also cover contextual data such as user involvement.

  • Metrics: as discussed earlier, metrics are quantitative data points that track aspects of system performance.

  • Traces: records of requests made within a network environment. Traces capture network calls, microservices, and databases used by each request. This information helps diagnose choke points and other network flaws.

Key differences: observability vs. monitoring

Comparing observability vs monitoring is subtle. The two concepts are closely related but differ in critical ways.

The central difference between observability and monitoring involves how tools process information. Monitoring tools assess predetermined information. Users determine data sets in advance, narrowing their analytical frame.

By contrast, observability tools consider all information processed by IT infrastructure. They check every data flow and application to optimize security and performance. Observability tools look “inside” assets to identify the internal state of network assets.

Network observability vs Network Monitoring

Aside from that overarching distinction, differences between monitoring and observability include:

  • Flexibility: observability allows flexible and interactive interrogation of network performance. IT teams can apply multiple perspectives and tailor each analysis to find the root cause of network alerts. Monitoring is more rigid, relying on predefined metrics and visualization options to track system health.

  • Scope: observability platforms use high-level metrics, traces, and logs to generate system-wide insights. Monitoring uses aggregated data to deliver less detailed feedback about specific aspects of the IT environment.

  • Depth: an observability platform goes to the root of network problems. It works from the “inside out” to diagnose issues. Monitoring tools are more limited. They deliver alerts about IT infrastructure performance based on predetermined rules.

  • Speed: monitoring tools deliver insights in real time. They generate alerts regarding anomalies or security threats. Observability tools tend to take a slower, more analytical approach.

Similarities between observability and monitoring

There are many differences between monitoring and observability. However, it’s important to note some core similarities.

Observability and monitoring are they similar

In practice, the two network management concepts complement each other. IT teams require observability and monitoring capabilities to optimize performance. Similarities include:

  • Data analysis: both observability and monitoring solutions collect, organize, and analyze network data. They use a similar mix of logs, traces, and metrics. They also assess similar issues, including resource usage, error rates, and transaction response times.

  • Data visualization: monitoring and observability tools must make information accessible and intelligible to users. Software generally includes external outputs like dashboards to present data. Intuitive data visualization allows users to note trends and identify areas of concern.

  • Automated alerts: both concepts include an alert function. Automated analysis delivers alerts regarding security or performance issues. Alerts inform corrective actions and sharpen an organization’s security posture, highlighting issues before they lead to vulnerabilities.

  • Troubleshooting: observability and monitoring apply root cause analysis to fix network problems. Complex distributed systems rely on observation and real-time monitoring to identify flaws. Both tools feed into investigation processes. They also help meet regulatory standards for secure DevOps and network management.

Choosing between observability and monitoring

Companies often face a dilemma when designing network solutions. Both observability and monitoring tools have their place in network management. However, given the cost of sourcing specialist tools, choosing between the two technologies is usually necessary.

An observability platform suits organizations that need in-depth insights into the internal state of networks. They are ideal for dealing with complex technical challenges and ensuring optimal performance across distributed systems. Organizations can customize the use of metrics, traces, and logs – focusing their analysis where it matters most.

Case study

A major global company deploys an observability platform across multiple countries and hybrid cloud and on-premises environments. Distributed agents collect performance data about client databases, data security, and data flow efficiency. Data collection helps the company manage loads and ensure the visibility of every device. Technicians can diagnose bottlenecks and triage security weaknesses before data breaches occur.

Click to tweet

Monitoring solutions suit organizations that need real-time updates and instant alerts. Monitoring systems deliver a more superficial analysis. However, they make up for this by leveraging predefined metrics to flag potential security or performance problems before they become critical.

Case study

A small healthcare provider must understand and protect its network assets to comply with HIPAA regulations. The company uses a network monitoring system to track device availability and the status of protected health data. The company creates simple metrics such as tracking baselines and automating monitoring to reduce its IT workload.

Click to tweet

Observability and monitoring compared to APM and telemetry

Let’s add another dimension to the discussion by bringing in Application Performance Monitoring (APM) and telemetry. Both APM and telemetry are alternatives to standard observability tools. While they can appear similar at first glance, there are some differences to consider before choosing the right option for your network.

Observability vs. APM

APM is a specific subset of observability tools that focuses on application performance. APM tools apply metrics to network applications. Examples could include response and error rates. They also assess transaction traces to track user activity, boosting overall network security.

Observability tools take a holistic perspective across all network asset classes. APM may be part of an observability solution, but these systems typically have deeper functionality than APM alone.

Another way of looking at this is scope. Observability seeks to analyze and understand connections at a network or enterprise level. APM adopts a more modest approach, focused on how single apps interact with users and other network assets.

APM has some advantages over comprehensive observability solutions. For instance, tailored APM solutions serve CRM or accounting apps. They may also feature simplified dashboards, making life easier for inexperienced IT teams.

APM is app-specific, making it a cost-effective alternative to in-depth observability platforms. Organizations need to assess whether that is a worthwhile trade-off.

Monitoring vs. APM

APM is also a subset of network monitoring. In this case, APM tools monitor end-to-end data flows within specific applications, generally to enhance DevOps performance.

APM is used to detect flaws within applications and deliver proactive alerts when things go wrong. This could be very useful in financial environments or cloud-native customer relationship management tools. However, companies often need broader monitoring systems that track network-wide performance.

Observability vs. telemetry

Telemetry deploys automated protocols like NetFlow or sFlow to collect network and device performance data. IT teams can use telemetry protocols to execute distributed tracing and monitor dynamic cloud settings. Data collection occurs across the network, delivering real-time data flows to central dashboards.

Put like this, telemetry probably sounds similar to observability, and it is. Both telemetry and observability tools enhance the visibility of data flows and network behavior. However, they offer differing analytical depths.

Observability tools allow IT professionals to carry out deep dives into network performance. DevOps teams can use observability tools to diagnose bugs rapidly and fix flaws. Telemetry on its own is less powerful. Telemetry tools deliver granular information about network activity. However, they do not have the same level of detail and flexibility.

Monitoring vs. telemetry

Telemetry monitors network systems, including local and cloud-based assets. It generates real-time information flows that can feed into alerts and automated fixes if desired.

These functions are very similar to the network monitoring tools we’ve already discussed. However, standard monitoring systems are usually less powerful than advanced telemetry.

Standard monitoring systems rely on predefined rules and data metrics, allowing relatively little user flexibility. Some monitoring solutions operate pre-set thresholds or device polling. This degrades their accuracy. By contrast, telemetry operates constantly, measuring data flows without interruption.

Observe and monitor your network with NordLayer’s help

Monitoring and observability tools empower organizations by collecting, aggregating, and analyzing information.

Network diagnostics rely on this knowledge to isolate flaws and identify the correct solution. And when knowledge is lacking, bad things happen. Without data collection systems, technicians handle every alert or outage on a case-by-case basis. That’s hardly a recipe for efficiency or security.

Companies should take action to ensure network visibility and implement data collection solutions. NordLayer is ideally placed to help you achieve these goals.

NordLayer’s solutions monitor network activity so you can take dynamic action before threats materialize or systems go down. Our visibility solutions enhance operational efficiency and help you protect data—two of the most pressing challenges for today’s digital businesses.

Contact our team today and explore your network monitoring options. Understand every aspect of network activity, from suspect user connections to device posture management. And give your team the knowledge needed to respond when emergencies arise.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

10 best VPN books to update your online privacy knowledge

This is the age of the Virtual Private Network (VPN). More than 1.5 billion people worldwide rely on VPNs, and organizations of every type routinely use Virtual Private Networks to protect their privacy. 

Those statistics aren’t surprising. Using the internet would be much more dangerous without the protection offered by VPNs.

What is a VPN?

VPNs use encryption to create tunnels between digital locations. They shield information from external attackers, cutting the risk of data breaches. They allow streamers to work around geo-blockers, and they guard individual liberty against surveillance states.

However, VPN solutions come in many varieties, and effective privacy systems adapt to different network architectures or data flows. Integrating VPNs into your setup requires in-depth knowledge of the latest techniques.

If that sounds daunting, help is at hand. The digital privacy community hosts many articulate writers with in-depth VPN and general privacy knowledge. We’ve selected the best VPN books from 2024’s crop. Check out a few titles to boost your VPN awareness and find the perfect privacy solution.

Top 10 VPN books

  • The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

  • Extreme Privacy: What It Takes to Disappear in America

  • CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

  • Build Your Own VPN Server: A Step-by-Step Guide

  • Business VPNs: Digital Privacy for Businesses and Teams

  • Network Security Assessment 3e: Know Your Network

  • Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022

  • Zero Trust Security: An Enterprise Guide

  • Beginner’s Introduction To Privacy

  • The Watchman Guide to Privacy: Reclaim Your Digital, Financial, and Lifestyle Freedom

The Art of Invisibility

The best VPN books The Art of InvisibilityNobody understands privacy threats like an experienced hacker. Luckily, a few people have crossed over from the dark side to share their experiences.

Kevin Mitnick (who sadly passed away in 2023) was once enemy number one for the cybersecurity authorities. Years of breaching government and corporate networks gave him insider knowledge that few people can match.

Before he died, Mitnick left this fascinating book about what digital freedom means and how we can protect it. Mitnick shows the limitations of traditional security tools like firewalls and anti-virus scanners. Insider tips about evading hackers and clear-eyed analysis of digital surveillance make this a must-read for VPN users.

Extreme Privacy: What It Takes to Disappear in America

Michael Bazzell makes a living helping celebrities to avoid data breaches and unwanted disclosures. This background makes him well-placed to advise the general public about how to protect online privacy.

“Extreme Privacy” works well because Bazzell outlines a comprehensive blueprint for designing privacy solutions. Bazzell wrote the book with individuals in mind. However, businesses will also benefit from his experience and ideas.

CCNP Security Virtual Private Networks SVPN 300-730

Moving on to something more technical, this standard guide provides everything candidates need to know when seeking a Cisco VPN certificate. The guide also includes quizzes and sample tests to prepare readers, and the three authors are all seasoned Cisco experts.

Cisco serves around 50% of business VPN service users in the United States, and certification proves that organizations understand how to build secure electronic systems. However, the expertise included in this textbook makes it a valuable read for all VPN engineers.

Build Your Own VPN Server: A Step-by-Step Guide

The best VPN books Build Your Own VPN Server

Building a VPN server is a tricky task. One configuration mistake can expose an entire network. Lin Song’s guide to open-source servers is the perfect starting point for companies developing independent privacy infrastructure.

Step-by-step instructions lead readers through configuration procedures for popular VPN protocols. Song covers Wireguard, IPSec, and OpenVPN. He also pitches advice at all major operating systems, always using accessible language.

Business VPNs: Digital Privacy for Businesses and Teams

The best VPN books Business VPNs

Gargiulo and Myers have helped hundreds of businesses implement site-to-site and single-site VPN coverage. This concise guide summarizes their expertise, providing practical ways to balance privacy and business efficiency.

“Business VPNs” will help companies select VPN solutions that suit their networks. However, it goes further than that, offering case studies about managing and maintaining VPNs to block malicious threats. Guidance covers access management, deploying firewalls, and secure configuration policies. Every section connects with everyday business users via case studies and real-world tips.

Network Security Assessment 3e: Know Your Network

This classic from O’Reilly explains how to carry out aggressive secure electronic network testing, including assessments of VPN protection. McNab’s textbook defines network testing best practices, with sections for email servers, VPN protocols, general network protocols, and operating systems.

Note: This book has various editions. The most recent was published in 2016 and is much more useful than earlier versions.

Implementing Always On VPN

The best VPN books Implementing Always On VPN

Microsoft’s Always On VPN is a popular way to secure cloud assets, protect remote devices, and integrate security systems with Active Directory. However, setting up an enterprise-wide Always On VPN can be tricky.

Richard Hicks cuts through the complexity, explaining VPN basics and core Always On features. If you want to connect VPN coverage to Azure deployments, his guide will show the way.

Zero Trust Security: An Enterprise Guide

Zero Trust is a critical security concept that treats all network users with suspicion unless they can supply proper credentials. VPNs play a central role in Zero Trust architecture by concealing sensitive data behind a wall of encryption.

This explainer covers more than just virtual private networks. Garbis and Chapman discuss firewalls, access management, public key infrastructure, and intrusion detection systems. The authors cover every component of Zero Trust network security.

However, we’ve included it in our VPN books list because the Zero Trust framework enables companies to make their VPNs more effective. And if you are interested in privacy, Zero Trust is something you need to know about — making this an essential read.

Beginner’s Introduction To Privacy

Sometimes, it helps to take a step back from VPN technology and assess the general privacy landscape. Brockwell’s short guide to privacy does just that. She explores what privacy means in the digital world and how we can protect our data against malicious threats.

Don’t expect in-depth technical specifications or excessive jargon. The strength of this book is how Brockwell makes complex ideas accessible and readable. It’s the ideal volume to skim through to remind yourself why privacy matters so much.

The Watchman Guide to Privacy

Better known as “the Watchman” in the privacy podcast world, Gabriel Custodiet is among the most creative privacy commentators. This general guide acts as a manual for modern businesses and individuals as they secure network assets against an endless stream of threats and snoopers.

While Custodiet ranges well beyond VPNs, digital privacy is his core focus. The book features plenty of nuggets of information about how to use encryption and choose the right VPN services. And the rest of the book is crammed with eye-opening material, from smartphone security to protecting financial assets.

Go beyond books to expand your VPN learning horizon

Books are indispensable tools to access knowledge and learn new skills. The publications above offer real-world advice and technical guidance for many critical VPN challenges. However, they aren’t the last word in building cybersecurity expertise.

The digital world offers security teams plenty of additional routes to VPN mastery. Wise organizations leverage as many information sources as possible to stay informed about security developments.

For example, VPN companies are often keen to provide information to potential customers. They realize that privacy protection is a grey area for many non-specialists. Educating customers helps them grow their client base while encouraging safer online behavior.

Some companies maintain learning centers that collate expert guidance in an easily searchable format. The NordLayer Learning Center is a great example, covering vast ground across every conceivable security topic.

Privacy podcasts provide regular updates from the coal face. Check out the IEEE’s Digital Privacy Podcasts for expert perspectives. Bookmark CPO Magazine as well for executive-level privacy insights and product reviews.

Sometimes, despite all the reading in the world, expert assistance is the only solution. NordLayer can help you navigate the complexities of VPN configuration. Explore Business VPN solutions that combine watertight security with flexible access and efficient performance. Get in touch with our team to discover more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Best practices for achieving cybersecurity visibility in hybrid work environments

Network visibility reveals network usage patterns, enhancing security awareness. Visibility is a critical part of secure hybrid work environments where new devices come online constantly, and workers can connect from almost anywhere. 

This article explains why network visibility matters in a remote and hybrid work context. We will explore the meaning of visibility and offer practical suggestions about how to discover network traffic and user activity on your network.

Why is visibility important in cybersecurity?

Visibility allows security teams to identify and monitor network connections. Good network visibility verifies the status of endpoints and inspects network traffic for threat detection and performance management.

Problems arise when engineers lack reliable visibility. Low visibility puts digital assets at risk. Malware and malicious users can infiltrate the network edge, resulting in data breaches or network attacks. Monitoring user activity is also more challenging in chaotic low visibility environments. Companies struggle to monitor data usage, creating compliance risks.

IT teams lack knowledge about traffic flows, network connections, user communities – and general performance. Troubleshooting and maintenance become very challenging.

Unfortunately, achieving cybersecurity visibility is not simple. Cloud devices and encryption create hard-to-inspect blind spots. Visibility tools may not monitor certain traffic types. Network complexity rises over time, out-pacing the ability to visualize network architecture.

Above all, remote connections can overwhelm security teams. Hybrid and remote work environments quickly become unmanageable, creating unguarded endpoints.

Cybersecurity challenges in hybrid work environments

Ensuring visibility is critical in remote or hybrid work setups. When workers leave the office, their workstations and data travel with them. Engineers must monitor every endpoint, even in remote work offices.

Visibility is hard to achieve, but the cybersecurity factors below make it essential.

  • Remote workforces expand the attack surface. Workers use many devices in different locations. They move between offices, homes, and public networks. There are more entry points for malicious actors. The risk of attacks rises.

  • Remote devices are vulnerable to network attacks. Laptops and smartphones might lack up-to-date virus protection or VPN coverage. Thieves can steal devices and extract valuable data.

  • Remote work presents opportunities for insider threats. Security teams may be unable to monitor user access. They cannot know who is viewing confidential data.

  • Collaboration tools used by remote workers also present vulnerabilities. Apps like Slack and Google Docs can expose sensitive data. Phishers can gain access via a single link.

Best practices for achieving cybersecurity visibility in hybrid work environments

Remote access comes with security risks. However, companies have many reasons to embrace home or hybrid work. Balancing flexible work and cybersecurity is critical. Follow these best practices to blend convenience and cybersecurity visibility.

Cybersecurity visibility best practices for hybrid work

Implement network monitoring

Cybersecurity visibility begins with remote network monitoring. Monitoring tools place remote agents on employee devices. Agents track network traffic, logging the files employees access, when they do so, and information like device profiles and locations.

Monitoring can raise privacy concerns if agents extend to non-work activities. Solve this issue by enforcing policies that stop workers from using the same laptop for work and leisure.

Engineers can also limit monitoring to relevant web apps and prevent the extraction of critical data. Everyday user activity remains private, but IT staff can still mitigate cybersecurity risks.

Establish clear and comprehensive cybersecurity policies

Secure remote work relies on robust cybersecurity policies. Policies create a framework for remote connections to central assets, establishing best practices and expectations.

Focus policies on critical remote work areas. For example, policies must cover password management, using antivirus tools and encryption, multi-factor authentication (MFA), and communicating with colleagues securely.

Explain what you expect from employees. Define what it means to connect or handle data safely. Reinforce expectations with regular employee training. Don’t allow anyone to set up a home office without thorough preparation.

Strengthen endpoint security

Endpoint security is a core challenge when ensuring remote work visibility. Every laptop or employee’s smartphone could be a vector for cybersecurity threats. Your security posture should cover every endpoint—wherever employees choose to work.

Require employees to use approved antivirus and anti-malware tools. Centralize patch management to ensure updates reach every device. Centralized delivery eliminates human error. Standardized protection covers all remote devices.

Use secure tools to establish remote connections. Business Virtual Private Networks (VPNs) help encrypt traffic flows and conceal business data from outsiders.

Endpoint Detection and Response (EDR) is another option. EDR tools provide threat visibility by monitoring endpoints for suspicious activity or vulnerabilities. EDR enables a proactive approach, countering weaknesses before threats to critical infrastructure emerge.

Embrace cloud-native security solutions

Using cloud services is often the best way to secure remote workers. Cloud tools do not rely on centralized network management or installing apps on user devices. Security tools reside on the cloud, traveling with employees.

Workers log on to company assets via Single Sign On (SSO) or Secure Web Gateways (SWGs). Cloud-native VPNs and network monitoring systems secure data flows when users access cloud services.

Cloud-native solutions make it easier to achieve cybersecurity visibility. Security teams can track cloud app usage, check for suspicious connections, and block access to sensitive cloud resources.

Embrace the Zero Trust security model

The Zero Trust model teaches network managers to “never trust, always verify.” This is a sound strategy for securing remote workers and ensuring cybersecurity visibility.

Basing network security on Zero Trust solutions. Robust access management tools verify identities and user permissions. Network segmentation and encryption keep critical infrastructure off limits without a business justification.

Continuous authentication also avoids complacency. Malicious actors gaining access during remote work sessions can’t get far without proving their identities. Zero Trust requires a vigilant, proactive security posture. Security teams assume that users represent cybersecurity threats unless they can prove otherwise – a stance that makes perfect sense when securing fluid remote work environments.

Strengthen access control

Access controls are a crucial component of Zero Trust approaches and a must-have for remote work visibility. Managing access promotes visibility by establishing the identities of network users. Security teams know which users are connected and their level of privileges. If users breach their privileges, systems deny access and generate alerts.

Customizing access policies using role-based access controls (RBAC) is advisable. RBAC streamlines access, mapping permissions onto employee roles. This enhances security without hindering business operations.

Provide security awareness training for remote employees

Remote work security is a human and technical challenge. Companies can only ensure cybersecurity visibility in remote work environments by providing regular employee training.

Training programs should cover critical remote work themes, including:

  • Password management and authentication using and updating security tools such as VPNs and anti-malware apps

  • Secure data handling and collaboration

  • Phishing awareness and physical device security

  • Incident response. How and when to inform security teams about threats or accidents.

How NordLayer can secure your hybrid workforce

Embracing remote work should never compromise cybersecurity. Realize the benefits of flexible working arrangements by ensuring cybersecurity visibility and creating secure remote work environments.

Building secure remote work systems from scratch is complex and time-consuming. Achieve better results (and save a lot of stress) by partnering with NordLayer’s network visibility solutions.

Our solutions make traffic visible and easy to analyze. Device Posture Monitoring verifies devices and ensures compliance with security policies. Usage Analytics helps you manage loads and optimize performance, while activity monitoring tracks member IDs and user behavior.

NordLayer’s tools put businesses in control of distributed networks. Security teams know who is connected and how they interact with network assets. To find out more, get in touch with our team today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×