How can we protect ourselves online? How do we ensure our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.
This week we begin very simply, in order to assess risk we must ascertain how our information might become vulnerable: that is to say, the potential attack surfaces.
The graphic above illustrates a very simple concept. We need to look at the different potential attack surfaces, including all the software we use on different devices in our lives, take inventory, and examine and think about the potential ways we are exposed. Anything that connects us to a network (including social media connections and home networks) in any way, at any time, needs to be considered. This includes the people in our lives!
Creating complete, written lists can be invaluable in protecting our information and gearing our mindset for developing a plan of attack for ourselves. Though simple, it is very much the first step in protecting ourselves. As we always talk about doing our homework in Wealth, we need to do our homework in wisdom too. We don’t know what to protect or how to protect it, if we don’t know what we are protecting.
Make sure to come back in next week and learn our next step, building our own I.C.E. For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.
Good Monday everyone and welcome to the BCB Cyber Series that takes on the tech…
05.23.21 GIF’d Up Cityscape: GIF’d Up Cityscape: Wuhan, capital of Hubei Province, PRC (People's Republic…
WAZZUP Y'ALL?!?!? Welcome back, everyone. The workweek was shit; we all know that, but hey,…
Our dystopian life now… Which high tech, low life story will we write today?
This website uses cookies.