Catching Up After a Brief Absence

The above image was sourced from Pixabay and created by user moebiusdream royalty free.

It has been a while since I posted last and figured some explanation might be better than none. I recently started a new role on the Helpdesk for an MSP. I know it does not sound glorious or really cybersecurity focused, however there is a case to be made that there is more contact with cybersecurity issues than other roles in tech such as being a field technician. Every day you are exposed to users preforming actions on systems some benign and others not so much. Communication is the key to ensuring the security of a system, there is an old saying that goes something like; "The user is the weakest link..." however there is a part of that that is often dropped off "and the greatest asset to the defensive team."

I have seen and heard from so many people on both ends of this spectrum on the helpdesk and actively stopped breaches before they occur. The helpdesk is the front line between attackers and users and can be brought into the incident response process. On the helpdesk you are also given access to systems, managers, and systems administrators who can implement wide changes based on what you are seeing. It can be taxing mentally to take calls and try to help users with a wide variety of issues but in the end it also gives you the opportunity to actually speak to end users and implement change even if it is just asking a question or giving them guidance.

The reason I took a break from blogging was to turn my full attention to the helpdesk and securing systems on the front line. I want to share this information with you not because I am tooting my own horn but because I want to share some insight for any who are cybersecurity inclined but cannot find a way into the industry. Sometimes the more valuable roles are not the ones with *cybersecurity* in the title. One last note and point I would like to make is that once you are in a technical role, with the right manager, you can involve yourself in cybersecurity projects.

disclaimer: The ideas and statements made in this article are the sole views of Exylum Technical.