iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Tuesday, February 23, 2016

Count to Ten

Blog Article/Post Caveat (Read First Please: Click the Link)

You know, when your emotions are a flame and you are ready to spout out some expletive to another human philosophers say we should count to ten before we say or do anything. This count to ten routine has a purpose: you get a chance to breathe deeply and into the diaphragm; you get a chance to stop and let the human logical brain chime in over the protests of the monkey brain chatter; you get a moment of clarity to consider the repercussions of your words and actions - all a means to avoid conflict and avoid possible violence. 

Now, lets take that to the internet and giving up “Personal Information” with a quick click of the little buttons that permeate every corner of the WWW. When you are asked for data or when you put out personal stuff and just click the button you are exposing yourself to everyone and every business and every predator, really - your making it easy for them.

So, in that light, while using all that wonderful connectivity technology take a moment before every single click of the mouse and ask yourself, “Do I really want to put this out there for everyone? Is this a necessary thing to do? What benefit do I get from clicking this button? and most importantly, “How can this be used by predators to hurt me?” 

Count to ten, count again; consider, contemplate, evaluate and decide - then and only then, click. 

Bibliography (Click the link)



No comments:

Post a Comment