You Must Know When To Break Protocol If You Want To Have Effective Security

As you get older, you start to realize that life has a bunch of rules that you have to follow if you want to be able to function properly. When you are young you tend to think that once you are not under your parent’s roof anymore then all of the rules just stop. You think that they are your only barrier and you will be able to be free once you are out of there. Well it is true that you will have more freedom but you will not totally be free. You will still have rules that you have to follow. But instead of your parents these rules will come from the law and from societal pressures.


But being older also means that you have to be able to tell when you should break the rules and when you should follow them. Not all situations are the same so you do not want to put yourself at a serious disadvantage because you followed the rules to the letter. You must be able to think freely and understand when you have to break protocol.

And that is what you have to do when it comes to computer security at times. In the world of computer security there are a lot of known protocols that you should follow. They are laid there by people with years and years of experience. They are put there so you do not have to make the same mistakes that they did. And this can be really useful at times. But sometimes it can also be detrimental.

Computer security, just like life, will throw you a lot of curveballs. There are different variables that you will have to deal with all of the time. That is why you have to always be prepared and to be ready to think on your feet. There are going to be times, like for instance with a new type of threat, that you will not be able to follow protocol. Following protocol will most likely hurt at this time. So you cannot be afraid to break ranks and do what needs to be done. Do not let the bad guys win because you were scared to stop them.

When you are doing computer security most of the time you are going to want to follow protocol. It can be very useful. But there are times when you are going to have to break protocol and think on your own. It will help you compete against the bad guys more effectively.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.

Speak Your Mind