Almost a year ago (December 21), Netflix released their original movie, Bird Box, and the audience response was incredible. The film was viewed by over 45 million accounts in the first week alone (a record for the streaming platform), and the numbers are continuing to rise. The plot shows the struggle of Malorie (played by Sandra Bullock), a mother who must protect her two children against a monster that kills you if you see it. This leads to Bullock and her two on-screen children spending almost the entirety of the film blindfolded.
This isn’t the first time a thriller of this nature has been so successful. A Quiet Place (which opened in theaters last April), tells the story of a family who lives in a post-apocalyptic world where speaking is forbidden, because the world is populated with monsters that hunt through their acute sense of hearing. The movie earned just under $50 million its opening weekend, which broke the record for the most successful first weekend for an original horror movie.
So why are people so fascinated by these films, and how in the world does that relate to cyber security? It’s simple.
There has always been a natural fascination derived from the fear of being out of control, and traditional horror movies try to capitalize on this by creating obscure and impossible characters like Pennywise the clown from IT, or the Gremlins. But what if your lack of control came from losing power over something not so farfetched that you encounter every day? What if you lost control over the ordinary things that you have never had to live without? These films force people to imagine a world without even just one of their key senses, creating a much scarier storyline, because rather than being frightened by the impossible, people are scared by the idea of losing control over their everyday realities.
How does this relate to cyber security?
The fascinating thing about cyber security is that there are many key components involved in creating a proper line of defense, and without any one of them you should feel vulnerable. Often, when people think of cyber security, they think of an computer lab with lots of exposed wires and screens depicting cyber-attacks from some villainous foreign hacker.
While these computer labs make for great film material, most hackers target personal computers and emails with simple scams like phishing.
If our world were to be invaded by some monster that hunted through sound or sight, then we might have to get innovative with defending ourselves.
However, in a world where trained hackers hunt down vulnerable information through unassuming users, we already have many defensive options available, most users just don’t know about them. Every user has multiple layers that their cyber security should be covering, and Conversant Group has partnered with the best solutions in the industry to help users protect these layers.
Contact Conversant Group today to learn more about how and why these layers should be secured, and what steps you need to be taking to create the strongest line of cyber defense.