How can we protect ourselves online? How do we ensure our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.
Chapter 3: I.C.E. Part Two (11.18.20)
In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.”
While we may not have the ICE yet as envisioned in Neuromancer, there are actions we can take to build our own countermeasures. It is incumbent upon us to take action and protect ourselves as individuals.
As we know trackers are everywhere, in the cameras we pass on the street, on the sites we search, and even on the devices, we stick in our pockets. That’s no reason to fear though so long as we take action.
When it comes to giving out personal information we are all guilty of giving out too much. With friends over chat, in a passing email, or even at the doctor’s office; ever give them your social security number? Not really required anymore!
Areas we should all reconsider when making private info public!
- Linking Family Relationships
- Advertising Place of Employment
- Sharing Interests
- Posting Kid’s Schedules
- Announcing Vacations – i.e. You are Not Home
- Broadcasting Personal Activities
- Sharing Birthdays, Real Phone Numbers, Personally Identifiable Information ALL
Take Action… Top Seven
- If You Don’t Have to Give it Out, Don’t!
- Turn On Privacy Settings /AND-OR/ Go Private; Never Depend Solely on Privacy Settings; Good Start in the Graphic Above
- Always Encrypt Where Possible and Personally Encrypt, Never Rely on Third Partie; Any Online Chat, Including SMS, Use End-to-End Encryption; EX Signal, Wickr Me, Dust, etc… Check out More HERE
- Double Check What You Are Going to Post
- Be Wary of Cloud Storage – EX Don’t Store Passwords on Cloud Storage; Store Private Stuff Offline!
- Be Creative: Security Questions Don’t Have to Be Real – Make It Up! For Example: Keep Real Cell Number Safe; Generate a Forwarding Number: Learn More at Life Wire or Google Voice
- Practice Good Cyber Hygiene- Strong/Unique Memorized Passwords/PINS, Trusted Device Logins, Use Secure Networks, Use Official Apps Only, Set Alerts, No Auto Storage of Passwords, etc., Always Enter the Actual URL, Monitor Regularly, Create Backups, Update Regularly, Keep Current on Antivirus/Antimalware, Keep Devices Themselves Safe, etc.
The elements depicted above help to illustrate the various elements we each can add to our daily lives to help protect ourselves. For BCB Cyber, this may be the last in this mini-series but not on our cybersecurity journey. Over time, we’ll be adding much more and diving into the details on how these various elements can be achieved and so much more.
Make sure to come back often. Please note that we aren’t sponsored by any of the above (save for the Amazon link for William Gibson’s work, #CommissionsEarned) we just love to share out great info! For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.