How can we protect ourselves online? How do we ensure our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.
Chapter 1: Understanding Cyber-Risk (11.04.20)
This week we begin very simply, in order to assess risk we must ascertain how our information might become vulnerable: that is to say, the potential attack surfaces.
The graphic above illustrates a very simple concept. We need to look at the different potential attack surfaces, including all the software we use on different devices in our lives, take inventory, and examine and think about the potential ways we are exposed. Anything that connects us to a network (including social media connections and home networks) in any way, at any time, needs to be considered. This includes the people in our lives!
Creating complete, written lists can be invaluable in protecting our information and gearing our mindset for developing a plan of attack for ourselves. Though simple, it is very much the first step in protecting ourselves. As we always talk about doing our homework in Wealth, we need to do our homework in wisdom too. We don’t know what to protect or how to protect it, if we don’t know what we are protecting.
Make sure to come back in next week and learn our next step, building our own I.C.E. For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.