From Network Admin to Cybersecurity Expert: Insights on Modern Security Challenges

I am writing this after my third cup of coffee — not exactly wired, but certainly feeling more awake. Born in 1993 where I started as a network admin who played around with voice (and data) mux over PSTN. Those were the days of coax cables and the sound of dial tones whirring into place. Fast forward to today, my minutes running my own cybersecurity company and advising clients on how to protect themselves in an age where modern-day threats make the old days seem almost nostalgic.

Here’s the thing — security is not some magical switch that you flip overnight. It’s an ongoing war, and having witnessed worms like Slammer tear through networks with my own eyes, the enemy moves fast. Let me share some anecdotal evidence that can give you some perspective into why Zero Trust is more than a buzzword and maybe not put all your eggs into that shiny AI powered security solution that everyone is trying to sell you.

From Network Admin to Cyber Consulting: The Path to a Career Field

In ’93, my universe was all about dealing with “dumb” infrastructure — routers, RPX (repeat pulse muxes — telco’s “Flux Capacitors”) and the incessant whir of analog lines. The challenges? Clear voices over noisy lines and properly handling the data packets so they don’t get lost or corrupted. No fancy dashboards, no big data, just raw tech and gallons of sweat.

Then there was the Slammer worm in 2003 — a rude awakening for all of us. It leveraged SQL server weakness, and bam — networks were at a standstill, services were stopped. I recall scrambling to patch servers hours before the worm came knocking on our doors. It was brutal—and humbling. That’s when I knew cybersecurity couldn’t be just patching; it had to be forward-thinking.

Today, running P J Networks means aiding businesses not just in patching, but in reconfiguring their architectures. I recently assisted three banks in revamping their zero-trust frameworks. Banks are not your regular corporate SME as usual; stakes are king and the threat actors? Ruthless.

What Zero Trust Really Means (and What It Doesn’t)

Zero-trust is often misunderstood. It’s not about turning everything into Fort Knox and hunkering down until everything stops. However, it is more about assuming breach and validating every interaction between resources and users.

Some fundamentals I push:

  • Trust no one by default — even if you’re inside the network. Because that’s where complacency kills.
  • Micro segmentation to restrict lateral move around in event of breach.
  • Multi-factor authentication everywhere. And no, SMS alone doesn’t cut it any longer.
  • Policies that adapt according to user behavior and risk.

But working with those banks, I really learned how a legacy system can weigh down your security. They had shiny firewalls and fancy VPNs, but not real segmentation. You have a castle with a moat but the back gate is wide open. The fix? Slow migration and lots of endpoint hardening — eliminating “trusted zones” altogether.

DefCon and the Hardware Hacking Village: Buzzing Still

Just returned from DefCon (lord, the hacking village on hardware was insane — and interesting). This is the future, people. By hacking into physical devices — not just software — hackers have created an entirely new attack surface that most companies don’t know how to defend against.

Here’s a small slice from the village:

  • IoT stuff is literally a security disaster. Cheap sensors, shabby hardware design and default passwords add up to juicy targets.
  • People tend to ignore firmware because its those “invisible” layers underneath your system.
  • Physical access can routinely circumvent the traditional network protections.

Honestly, if you have not already considered hardware security in your risk assessment, you are already behind.

Password Policies: My Never-Ending Rant

OK, I just had to get that off my chest—I’m never getting comfortable with the way companies dictate that I change complex passwords every 30 days. Here’s the thing:

  • Regular forced changes cause easy patterns to predict (Password1, Password2 and through sequence)
  • Users write down passwords or employ the same one odd string
  • It drives folks nuts and ultimately it makes us less safe.

Betting on long, unique passphrases paired with MFA isn’t much of a gamble compared to eternal password resets. It’s not merely a matter of opinion, either — recent NIST recommendations support it. But change is slow.

Quick Take: The News You Really Need to Know Today

  • Your network is the foundation yet the greatest point of attack.
  • Legacy systems are not your friends; upgrade them or segment them.
  • Zero trust is about verification, not paranoia.
  • And hardware hacking is the next frontier. Don’t ignore it.
  • Password policies need to be reasonable. Rethink complexity and reset frequency.
  • Keep the skepticism, especially when powered by A.I. The AI hype is real, but security needs context, not just shiny buzzwords.

Real-World Tips From My Desk

Thinking aloud here…

  • Regular penetration tests (not just network, but including hardware).
  • Use layered defense. It’s like cooking a curry: multiple spices (controls) are layered for flavor (security), not just one that is overpowering.
  • Train your people. Yet most breaches are the result of phishing or human error.
  • Spend on logs and monitoring. You can’t really defend what you can’t see.

Last Stream Before I Need Another Coffee

Cybersecurity is a long distance race, not a sprint. From the days I patched Slammer to guiding banks about zero-trust, the lessons are clear: Remain humble, remain curious, but don’t ever get comfortable.

If you believe that your out-of-the-box firewall or router is adequate — think again. Configurations matter. And your security is also very much not just about tech — it’s a mixture of people, processes, and sometimes luck.

So, even if you’re a tech aficionado, or a cyberwarfare neophyte, keep in mind, every byte counts. Keep your defense stacked, your teams on point, your coffee strong. We’ve got work to do.

And one more thing — if someone tells you that AI-powered equals all-hands-off security, they’re lying. Always, trust but verify.

Stay safe out there,

Sanjay Seth
P J Networks Pvt Ltd

Leave a Reply

Your email address will not be published. Required fields are marked *

This field is required.

This field is required.