Myths in the media

Cybersecurity myths are everywhere, let's have them debunked

1. It's all about the code

All cybersecurity pros are super programmers.


Many professionals in the cybersecurity industry possess skills in programming, but cybersecurity is not all about writing code. Having knowledge about networks is also essential.

2. It's all about hacking

Working in cybersecurity means being a hacker.


A hacker is someone who tries gain access to computers by exploiting weaknesses in a computer system or networks. Hacking is an illegal activity. Cybersecurity includes but is not limited to researching new vulnerabilities and exploits, defending networks, analyzing new malicious software, and more.

3. It's too much of work

Everything in cybersecurity is a crisis, extremely intense and fast-paced.


A job in cybersecurity can, at times, become intense, but often it is not. For example, if you’re a cybersecurity defender and there are attacks coming to your network, that can be intense. However, world destruction is not at hand every single day, not even for James Bond.

4. It's too long or just too hard for me

Cybersecurity takes years to learn and is very difficult.


Many current professionals began with little formal training. Math and science do make certain aspects of cybersecurity easier, but curiosity and a love of solving problems can get you started. No one knows it all - find something about cybersecurity that interests you and go for it!

5. Common Stereotypes

Hackers are weird geeky teen males that live in a dark basement. Cybersecurity professionals are all older geeky men.


Cybersecurity professionals and hackers come in all shapes and sizes, male and female, and old and young.

6. Hacker has total control

If someone breaks into an organization’s website, they have control over the company’s entire network and computing infrastructure.


If a company’s website is hacked, then the attacker only has access to the website and what is stored on the website server - nothing else.

7. All hacker needs is the IP address

Hackers can break into a device simply because they have its IP address.


It is often not difficult to retrieve someone’s IP address, however, this is only one bit of information that is needed launch a successful attack and get access to a system or device.

8. Every attack is a new one

The bad guys only use new vulnerabilities to compromise computers.


Most attacks take advantage of weaknesses that have been public knowledge for a while, but that haven’t been patched yet. This is why it is very important to install all updates for a device or software.

9. Stay anonymous

All cyber activity can be done anonymously without mistakes.


All cyber activity can be traced. While it is true that there are ways to make it very difficult for specialists to trace an attacker, it is impossible to leave no trace at all.