The buzz about cybersecurity is all around us. Just last week, we saw another well-known company get hit! In that linked report, we learned that the breached company started with an announcement that there was a “system failure,” but quickly announced that it was in fact cyberattackers behind the incident that caused Point-of-Sale outtages, libraries to be wiped according to customers, and customer data to potentially have been leaked! Other than restoring services and stipulating warnings in emails that went out to those whose information may have been breached, little assistance was offered to those customers.
With activity like this going on every day across the world, how can we possibly as individuals protect our cyber-lives? How can we make sure that our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.
Introducing a 3-Part Series:
While we are dedicating a whole section of our site to cybersecurity as a field in its own right, we begin with how we as individuals can better prepare ourselves in light of our own cybersecurity situation. With new stories coming to light each and every day, it’s on each one of us to move forward and do what we can to protect ourselves.
Chapter 1: Understanding Cyber-Risk (11.04.20)
Understanding risk and engaging that knowledge can help empower us to be better protected as individuals. Join us to learn how we can each uncover lurking data dangers in our own lives and explore what we can do about them.
Chapter 2: I.C.E. Part One (11.11.20)
In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.” While we may not have ICE yet, there are actions we can take to build our own version. In this section, we begin that discussion, and discuss the basic elements of creating our own ICE.
Chapter 3: I.C.E. Part Two (11.18.20)
In ICE part two, we dive deeper. In this chapter, we will explore privacy specifically and examine some of the best tips and tricks to help keep us protected.
Make sure to come back in November to join us for this exciting new series. For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.