B2N Eps-3: Cybersecurity

Highlights

  • Reasons for cybersecurity
  • Understanding risk and vulnerability
  • Focus: how you use the internet – from web browsers and social media contenting to your mobile device and connectivity – information risk
  • Security awareness for people working from home
  • Strategies to Mitigate Risk / Counter-measures to potential cyberattacks: deterrent/preventive/avoidance control
  • Report from Security Experts and Whistleblower: Edward Snowden
  • Reactions / comments / Q&A
  • Career in Cybersecurity
  • Conclusion
Back to Normal Episode 3: Let’s Talk Cyber Security

Watch Live Streams on

My Social Media Handles
Instagram Page link: https://www.instagram.com/gjefspecials.co.uk/

Facebook Page link: https://www.facebook.com/gjefspecials

Reasons for cyber security awareness

  • Protection of resources (especially your data) against threat agents/hackers. Hackers can exploit your data vulnerabilities (information gathering)
  • Ever-increasing usage of social networks, apps, and emerging remote jobs across the globe poses the risk of a data breach
  • Scammers, spammers, and Internet frauds are on the rise like never before  – a reference to the dark web
  • Your data is your asset – if it’s compromised, you’re not safe.

Understanding risk and vulnerability

  • Risk – the probability of loss/exposure to danger.
  • Vulnerability – weakness in a system that can be exploited.
  • Lack of security awareness puts you at great risk due to vulnerabilities inherent in the Internet, mobile apps, networks, and social networks.
  • See vulnerability as a ValueWhat is it going to cost you, your loved ones, your business, or the organization if it is exploited?

Focus of the cyber security awareness:

How you use the internet – from web browsers and social media contenting to your mobile device and connectivity – particularly information risk

  • Web browsers and mobile apps have vulnerabilities that are constantly exploited by threat agents.
  • Take caution while using third-party software apps. Some of them are designed primarily for data breaches – there are a countless number of them.
  • Read terms and conditions of services carefully before you tick the ‘Agreement box’.
  • Beware of giving authorization and/or permission to apps in accessing your device storage, camera, messages, and microphone.

Security awareness for people working from home

  • Connectivity between your home network and that of your company cut across some distance. There’s a potential risk of interception by threat actors.
  • Data exchange can be intercepted.
  • Hackers can access your home network and further gain control of the organization’s network
  • Risk of eavesdropping by neighbors, visitors, and relatives.

Strategies to Mitigate Risk / Counter-measures to Potential Cyberattacks: deterrent/preventive/avoidance control

For general users

  • Use 2F/3F Authentication
  • Avoid sharing personal information on social networks (esp. PII)
  • Take caution while granting permission or authorization to apps requesting to access your device storage, messages, camera, and microphone.
  • Avoid connecting to public free WiFi.
  • Do not visit suspicious websites. Avoid clicking on links in spam emails.
  • Shut down your WiFi, hotspot, or device when not in use esp. at night.

For remote workers

  • Isolate your home office & dedicate it for work within working hours – not accessible by relatives or visitors.
  • Separate your office network from a home network.
  • Hide WiFi SSID and use the latest encryption technology with a strong password.
  • Confirm your VPN tunnel is secured & well configured by the IT team.
  • Monitor your network and ensure no one else is connected to it.
  • Make sure no one is eavesdropping on your conversation.
  • Use a dedicated device for work purposes only.

Careers in Cyber security

Considering a career in cyber security?

  • There is significant demand for well-qualified information security/cybersecurity & IT risk professionals in Ireland (and globally) due to skill shortage. This means Increased salaries.
  • Earn industry certifications to progress through the career ladder at a faster pace. It’s a highly dynamic industry. Which industry certifications are right for me?
  • Key job roles in cybersecurity include Security Analyst, Security Engineer, Security Architect, Penetration Tester, Security Consultant, and Incident  Responder.

In Conclusion

McAfee 1024x1024 Lets Talk Cyber Security   Back to Normal Eps 3
John McAfee

“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”

– Benjamin Franklin

17 thoughts on “Let’s Talk Cyber Security – Back to Normal Eps-3

  1. I was excited to discover this website. I want to to thank you for your time for this wonderful read!! I definitely liked every part of it and i also have you book-marked to look at new things on your website.

  2. Good post. I learn something totally new and challenging on blogs I stumbleupon every day. It will always be interesting to read through articles from other writers and use a little something from other sites.

  3. I appreciate, cause I found just what I was looking for. You have ended my four day long hunt! God Bless you man. Have a great day. Bye

  4. You made some nice points there. I did a search on the subject matter and found most persons will approve with your website.

  5. Hello, you used to write great, but the last few posts have been kinda boring… I miss your great writings. Past few posts are just a bit out of track! come on!

  6. Greetings! I know this is kind of off topic but I was wondering which blog platform are you using for this website? I’m getting tired of WordPress because I’ve had issues with hackers and I’m looking at options for another platform. I would be great if you could point me in the direction of a good platform.

  7. Hi! Someone in my Myspace group shared this site with us so I came to take a look. I’m definitely enjoying the information. I’m bookmarking and will be tweeting this to my followers! Great blog and excellent style and design.

  8. Hello! This is my 1st comment here so I just wanted to give a quick shout out and tell you I truly enjoy reading your blog posts. Can you recommend any other blogs/websites/forums that go over the same subjects? Many thanks!|

  9. Excellent post. I was checking constantly this blog and I am impressed! Very useful information specifically the last part 🙂 I care for such information much. I was seeking this certain info for a long time. Thank you and good luck.|

  10. excellent post, very informative. I ponder why the other experts of this sector don’t understand this. You must proceed your writing. I am sure, you’ve a huge readers’ base already!|

  11. Generally I do not read post on blogs, but I wish to say that this write-up very compelled me to try and do so! Your writing style has been amazed me. Thanks, very great post.

Leave a Reply

Your email address will not be published. Required fields are marked *

Protected with IP Blacklist CloudIP Blacklist Cloud