In exploring cybersecurity we will take on many topics, each with the intent of individualizing the field so we can not only gain a better understanding but actually be able to put it to work in our lives. Below, we compile our daily posts into organized sections on a variety of topics. As we are just starting out, the list below is small, but we are growing. If there is a topic you’d love us to cover, send us a message and we’d love to explore it together!
How to Evaluate & Begin to Protect Our Own Digital Identity
The buzz about cybersecurity is all around us. Just last week, we saw another well-known company get hit! In that linked report, we learned that the breached company started with an announcement that there was a “system failure,” but quickly announced that it was in fact cyberattackers behind the incident that caused Point-of-Sale outtages, libraries to be wiped according to customers, and customer data to potentially have been leaked! Other than restoring services and stipulating warnings in emails that went out to those whose information may have been breached, little assistance was offered to those customers.
With activity like this going on every day across the world, how can we possibly as individuals protect our cyber-lives? How can we make sure that our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.
Chapter 1: Understanding Cyber-Risk (Published on 11.04.20)
We begin very simply, in order to assess risk we must ascertain how our information might become vulnerable: that is to say, the potential attack surfaces.
The graphic above illustrates a very simple concept. We need to look at the different potential attack surfaces, including all the software we use on different devices in our lives, take inventory, and examine and think about the potential ways we are exposed. Anything that connects us to a network (including social media connections and home networks) in any way, at any time, needs to be considered. This includes the people in our lives!
Creating complete, written lists can be invaluable in protecting our information and gearing our mindset for developing a plan of attack for ourselves. Though simple, it is very much the first step in protecting ourselves. As we always talk about doing our homework in Wealth, we need to do our homework in wisdom too. We don’t know what to protect or how to protect it if we don’t know what we are protecting.
Chapter 2: I.C.E. Part One (Published on 11.11.20)
In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.”
While we may not have the ICE yet as envisioned in Neuromancer, there are actions we can take to build our own version. It is incumbent upon us to take action and protect ourselves as individuals. The elements depicted above help to illustrate the various elements we each can add to our home networks and environments to help protect ourselves. For BCB Cyber, the only illustrates the first building block on our cybersecurity journey.
Chapter 3: I.C.E. Part Two (Published on 11.18.20)
In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.”
While we may not have the ICE yet as envisioned in Neuromancer, there are actions we can take to build our own countermeasures. It is incumbent upon us to take action and protect ourselves as individuals.
As we know trackers are everywhere, in the cameras we pass on the street, on the sites we search, and even on the devices, we stick in our pockets. That’s no reason to fear though so long as we take action.
When it comes to giving out personal information we are all guilty of giving out too much. With friends over chat, in a passing email, or even at the doctor’s office; ever give them your social security number? Not really required anymore!
Areas to Consider
- Linking Family Relationships
- Advertising Place of Employment
- Sharing Interests
- Posting Kid’s Schedules
- Announcing Vacations – i.e. You are Not Home
- Broadcasting Personal Activities
- Sharing Birthdays, Real Phone Numbers, Personally Identifiable Information ALL
Take Action… Top Seven
- If You Don’t Have to Give it Out, Don’t!
- Turn On Privacy Settings /AND-OR/ Go Private; Never Depend Solely on Privacy Settings; Good Start in the Graphic Above
- Always Encrypt Where Possible and Personally Encrypt, Never Rely on Third Partie; Any Online Chat, Including SMS, Use End-to-End Encryption; EX Signal, Wickr Me, Dust, etc… Check out More HERE
- Double Check What You Are Going to Post
- Be Wary of Cloud Storage – EX Don’t Store Passwords on Cloud Storage; Store Private Stuff Offline!
- Be Creative: Security Questions Don’t Have to Be Real – Make It Up! For Example: Keep Real Cell Number Safe; Generate a Forwarding Number: Learn More at Life Wire or Google Voice
- Practice Good Cyber Hygiene- Strong/Unique Memorized Passwords/PINS, Trusted Device Logins, Use Secure Networks, Use Official Apps Only, Set Alerts, No Auto Storage of Passwords, etc., Always Enter the Actual URL, Monitor Regularly, Create Backups, Update Regularly, Keep Current on Antivirus/Antimalware, Keep Devices Themselves Safe, etc.
The elements depicted above help to illustrate the various elements we each can add to our daily lives to help protect ourselves. For BCB Cyber, this may be the last in this mini-series but not on our cybersecurity journey. Over time, we’ll be adding much more and diving into the details on how these various elements can be achieved and so much more.