Lets get real for a moment, you are going to have to make some sacrifices to gain a secure foothold on your internet connectivity security. It will, at first, cause you to have a panic attack. You are going to say, “Not just no, but hell no.” You just have to know and understand if you fall to that thinking you will need to accept your vulnerability and then stay open to attack.
Yea, you may go your entire life and never feel the pain and anguish of being electronically psychologically pummeled. But remember this, it just takes one moment, any moment - that one instance where your entire life falls down into the black hole of the internet. If you feel confident and safe; if you feel confident and safe relying on the protection of others whose sole goal is to earn a living through the demand for others to secure and safeguard your life and livelihood. Really, if you are willing then your reading stops here - have a great day.
If you don’t want to rely on others for your safety and security then continue reading this blog because I am going to try my hardest to teach myself how to remain safe and secure, as safe and as secure as any one human can achieve in a violent world of the wild, wild Internet. Remember, I don’t have all the answers but I will present material that will help you to create your own questions. It is up to you, YOU, to find out the truth and to create your own security posture and it is up to YOU to implement it and maintain it - FOREVER AND EVER!
A few things about me, first is I am not an expert on the Internet, Internet security or other safety within the Internet. I am a security professional. I retired from a very large organization as their security specialist and I have a degree for security, technology and management. I have spent the last fifteen years working for another very large organization as, at first, a workstation technician where one of my many responsibilities was to maintain a decent security posture for every workstation in my department. I also moved into management of development quality assurance testing and development release management. I am working as a systems administrator for various enterprise applications on the first level service support, etc.
I also have a good deal of experience in government as a security professional with emphasis on computer security as well as what they call, “Communications Security Management.” So, at least on a very basic and fundamental level I have enough knowledge, understanding and experience to at least write about our needs in this area so that others may venture forth into the darkness and by self-education and research can find the light switch and make it at least harder for the nefarious predators of the Internet to attack and harm my electronic/internet presence.
Oh, also, I am well versed and at least moderately experienced in the real world of self-defense through learning, training, practicing and applying self-defense by the methods of avoidance, escape, evasion and physical use of appropriate force in self-defense, etc. Look at that experience as one third the physical and two-thirds the academic so I can at least discuss it intelligently and apply it almost adequately.
This blog is about learning so you can expect that some of them will ask you to consider taking such actions that will put you into a panic mode and cause you great stress but stop and consider all aspects of the recommendations and the repercussions of both applying them or not applying them. Weight the depth and breadth of those repercussions using a smaller emotional influence and let the greater part be decided by your logical side. At least you will be able to research more and then make a educated and informed decision instead of just reacting to the monkey brains need for gratification in the moment with total disregard for our future.
p.s. overcoming instant gratifications from the key click, i.e., just consider the rush you will get when one day a hacker tries but fails, your safe and secure while living the good life clicking and clacking around all your connective devices. ;-)
Bibliography:
Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015.
No comments:
Post a Comment