🤦 Cyber Fiction








💡 🏭 When you are compliant (e.g., NERC-CIP, NIS2, Bill C-26), you just proved that you're attack-prone-free! Your "Cyber Defense" plan is in place, and no extra steps are needed. Tap yourself on the back!


💡 🏭 How amazing it is that IT/OT convergence makes things so much easier to manage, and cost effective, under one infrastructure! Critical Infrastructure's industrial process is solid being on the same support that's running corporate web sites, that's the most secure when IT manages OT. People's safety isn't in jeopardy, don't even worry about it.


💡 🏥 We have developed a Mobile App that can control wirelessly your IV Pump and medication dosage! Just install it on your phone and you're set! It's that easy! Since it's in your phone, no security required other that our encrypted source code! Your life is not going to be in jeopardy, guaranteed!


💡 🏭 When you buy hardware-based components (e.g., IoT, IIoT) for your business offerings (e.g., AMI - Advanced Metering Infrastructure, Smart City IoTs, Drones), those are based on closed systems! When it's "Closed" it's "Breach Free"!


💡 🏭 Let me tell you something. If you have never had a breach, you must be the most secure there is. It's never going to happen to you, trust me!


💡 🏭 The Cloud! When you put all your operations and especially your industrial process components (e.g., SCADA, HMI) in the Cloud, nothing can touch you! Cloud is synonym with "Safe"!


💡 🏭 Got your machines protected? There you have it; you can have peace of mind now! Other layers of defense are not required, even if you might think you have other attack vectors (e.g., LoRaWAN, WiFi with WPA3 Enterprise, 5G), don't worry about it, that stuff is military-grade!


💡 🏭 You might be on the top of your game! Hiring penetration testers to validate if you can be breached from the outside, and they have found nothing so far? Well, that's it, no need to invest in security controls or any cyber defense strategy, as it's just a wasted investment!


💡 🏭 If your infrastructure is based on macOS and GNU/Linux operating systems, you don't even need to worry about security at all! Those are the safest operating systems by design, and you will get zero infection/breach!


💡 🏭 Using the trendiest Anti-Virus solution is all you need, as will block every type of attack! No need for any other security controls.


💡 🏭 When using very strong passwords, that's the highest level of protection. You're as safe as Fort Knox!


💡 🏭 Log4j vulnerabilities are many years-old, no need to worry about them. Ransomware gangs don't like to leverage old vulnerabilities. You're safe, it's not in the news anymore.


💡 🏭 If you are a small shop or in critical infrastructure, cyber criminals have no interest in you, they only target big financial compagnies. You're safe!








To reach out to us or for submissions to be published, please email us at contact /at/ cyberfiction /dot/ wiki.

DISCLAIMER: The information provided on this website does not, and is not intended to, constitute legal advice; instead, all information, content, and materials available on this site are for general informational purposes only. Information on this website may not constitute the most up-to-date legal or other information.