Wisdom

OUR CYBER-WISDOM: Cybersecurity, Evaluating Our Own Situation

The buzz about cybersecurity is all around us. Just last week, we saw another well-known company get hit! In that linked report, we learned that the breached company started with an announcement that there was a “system failure,” but quickly announced that it was in fact cyberattackers behind the incident that caused Point-of-Sale outtages, libraries to be wiped according to customers, and customer data to potentially have been leaked! Other than restoring services and stipulating warnings in emails that went out to those whose information may have been breached, little assistance was offered to those customers.

With activity like this going on every day across the world, how can we possibly as individuals protect our cyber-lives? How can we make sure that our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.

Introducing a 3-Part Series:

While we are dedicating a whole section of our site to cybersecurity as a field in its own right, we begin with how we as individuals can better prepare ourselves in light of our own cybersecurity situation. With new stories coming to light each and every day, it’s on each one of us to move forward and do what we can to protect ourselves.

Chapter 1: Understanding Cyber-Risk (11.04.20)

Understanding risk and engaging that knowledge can help empower us to be better protected as individuals. Join us to learn how we can each uncover lurking data dangers in our own lives and explore what we can do about them.

Chapter 2: I.C.E. Part One (11.11.20)

In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.” While we may not have ICE yet, there are actions we can take to build our own version. In this section, we begin that discussion, and discuss the basic elements of creating our own ICE.

Chapter 3: I.C.E. Part Two (11.18.20)

In ICE part two, we dive deeper. In this chapter, we will explore privacy specifically and examine some of the best tips and tricks to help keep us protected.

Make sure to come back in November to join us for this exciting new series. For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.

Brian C. Briggs

Share
Published by
Brian C. Briggs

Recent Posts

The Return

Greetings All... Just wanted to say, we'll be back... on August 1, 2022!

2 years ago

On Break

05.25.21 Good Morning Everyone! As of today we will begin a two-week break, but we…

3 years ago

Top Tech Stocks: Dividend Payer Edition Norilsk Nickel (NILSY)

Good Monday everyone and welcome to the BCB Cyber Series that takes on the tech…

3 years ago

Skyscrapers & Skylines: Wuhan

05.23.21 GIF’d Up Cityscape: GIF’d Up Cityscape: Wuhan, capital of Hubei Province, PRC (People's Republic…

4 years ago

Bullz or Bearz??? & MORE!!!

WAZZUP Y'ALL?!?!? Welcome back, everyone. The workweek was shit; we all know that, but hey,…

4 years ago

Cyber-Zen Friday 05.21.21

Our dystopian life now… Which high tech, low life story will we write today?

4 years ago

This website uses cookies.