Little Red Riding Hood in an online world


[Reading time: 2 minutes]

The tale of little red riding hood dates back to the 10th century. For those who don’t remember the details of the tale, here’s the executive summary* :

A girl called Little Red Riding Hood walks through the woods to deliver food to her sick grandmother.

A Big Bad Wolf wants to eat the girl and the food in the basket. He secretly stalks her and then approaches her, and she naively tells him where she is going.

He goes to the grandmother’s house and gains entry by pretending to be the girl. He swallows the grandmother whole and waits for the girl, disguised as the grandma.

When the girl arrives, she notices that her grandmother looks very strange. But before she realises she’s in trouble, the wolf jumps out of bed and eats her, too.

What does this tell us about the wolf?

Putting aside his ability to speak to humans, he didn’t need an amazing intellect to perpetrate this fraud.

He was just lurking around the forest, looking for any type of prey.

With the likes of little red riding hood and granny in the vicinity, he didn’t need to work hard.

What does this tell us about little red riding hood and her granny?

This is a reminder of how unsafe the big bad world can be, and how unsafe it is to open the door to someone just because they seem legitimate.

If only Little Red Riding Hood had been told to watch out for the tactics of the wolf, and not to reveal details of her future plans.

If only granny had been told to make sure it really was Little Red Riding Hood knocking on the door before she opened it.

What does this tell us about cybersecurity?

Some of your staff are acting like little red riding hood or granny online – Especially when they’re using email.

They’re easy prey for the many wolves out there.

What has your firm done to regularly train these staff so they are more likely to spot a wolf before it’s too late?

* Extracted from Wikipedia & edited.