iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Friday, February 19, 2016

Some Sacrifices = Panic Attacks = Stress = Adrenal Chemical Reactions - Oh My!

Blog Article/Post Caveat (Read First Please: Click the Link)

Lets get real for a moment, you are going to have to make some sacrifices to gain a secure foothold on your internet connectivity security. It will, at first, cause you to have a panic attack. You are going to say, “Not just no, but hell no.” You just have to know and understand if you fall to that thinking you will need to accept your vulnerability and then stay open to attack. 

Yea, you may go your entire life and never feel the pain and anguish of being electronically psychologically pummeled. But remember this, it just takes one moment, any moment - that one instance where your entire life falls down into the black hole of the internet. If you feel confident and safe; if you feel confident and safe relying on the protection of others whose sole goal is to earn a living through the demand for others to secure and safeguard your life and livelihood. Really, if you are willing then your reading stops here - have a great day. 

If you don’t want to rely on others for your safety and security then continue reading this blog because I am going to try my hardest to teach myself how to remain safe and secure, as safe and as secure as any one human can achieve in a violent world of the wild, wild Internet. Remember, I don’t have all the answers but I will present material that will help you to create your own questions. It is up to you, YOU, to find out the truth and to create your own security posture and it is up to YOU to implement it and maintain it - FOREVER AND EVER!

A few things about me, first is I am not an expert on the Internet, Internet security or other safety within the Internet. I am a security professional. I retired from a very large organization as their security specialist and I have a degree for security, technology and management. I have spent the last fifteen years working for another very large organization as, at first, a workstation technician where one of my many responsibilities was to maintain a decent security posture for every workstation in my department. I also moved into management of development quality assurance testing and development release management. I am working as a systems administrator for various enterprise applications on the first level service support, etc. 

I also have a good deal of experience in government as a security professional with emphasis on computer security as well as what they call, “Communications Security Management.” So, at least on a very basic and fundamental level I have enough knowledge, understanding and experience to at least write about our needs in this area so that others may venture forth into the darkness and by self-education and research can find the light switch and make it at least harder for the nefarious predators of the Internet to attack and harm my electronic/internet presence. 

Oh, also, I am well versed and at least moderately experienced in the real world of self-defense through learning, training, practicing and applying self-defense by the methods of avoidance, escape, evasion and physical use of appropriate force in self-defense, etc. Look at that experience as one third the physical and two-thirds the academic so I can at least discuss it intelligently and apply it almost adequately. 

This blog is about learning so you can expect that some of them will ask you to consider taking such actions that will put you into a panic mode and cause you great stress but stop and consider all aspects of the recommendations and the repercussions of both applying them or not applying them. Weight the depth and breadth of those repercussions using a smaller emotional influence and let the greater part be decided by your logical side. At least you will be able to research more and then make a educated and informed decision instead of just reacting to the monkey brains need for gratification in the moment with total disregard for our future. 

p.s. overcoming instant gratifications from the key click, i.e., just consider the rush you will get when one day a hacker tries but fails, your safe and secure while living the good life clicking and clacking around all your connective devices. ;-)

Bibliography:
Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015. 

Eagleman, David. “Incognito: TheSecret Lives of the Brain.” Vintage Publishing. NewYork. May 2012. 


No comments:

Post a Comment