This is the best anyone can hope for in iSD. Taking actions that will result in your understanding of the threats involved and those actions you take, personally, to mitigate the exposure you will experience. You will experience exposure no matter what you do. The only real way to avoid and succumb is to go back in time before the true Internet began and never, ever, engage in any type of electronic access to the Internet. We all know that it ain’t gonna happen but you can reduce your exposure by the actions you take.
Example, I am in the IT business and I work with coders all the time as a release management staff member who releases instances of Enterprise applications to QA testing environments then on to the actual production environments. I have a pretty good understanding of how things work and saying that means nothing because I didn’t truly, fully and completely understand what it is we face daily until I read Marc Goodman’s book, Future Crimes. At one time I thought I was secure and safe but in recent months I have found that as long as I continue to use certain products or sites my security and safety is in a critical exposure state. Just yesterday, on an Apple iMac with the latest OS X and updates found my system completely frozen. It seems even the Apple products are succumbing to the cyber-world of predatory actions.
It took me two hard boots to get my system running again and if I were still on a Windows system I suspect, like the last time I got hacked on a Windows XP box, I would be reinstalling a clean OS to remove the offending malware, etc. I got lucky this time and I use a lot of the recommendations as to exposure and actions I recommend.
As I continue to study and learn about this hidden Internet it comes to mind that there really is a matrix out there and although it is hidden from us, most of us, it still has dangerous effects on us and how Internet experiences. Add in the cloud based models everyone seems to be gravitating towards to save money, those make our exposure even more dangerous especially when individuals and organizations click “Accept” on those ToS’s.
In self-defense, the one I normally write about involving social and asocial violence that involves human physical contact, I talk/write about awareness and there are many types of such awarenesses so too is there types of awarenesses in iSD or Internet Safety, Security and Protection. There is only one way to achieve that knowledge and understanding and that is to seek it out, study it, understand it and then take what appropriate actions you personally deem necessary to protect yourself.
As I have stated in other articles your physical self may not be exposed to the dangers of a predatory process and/or resource attack but you psychological side is exposed to predatory process/resource attacks in the iVerse.
Oh, in a recent article I posted that the dark-verse hidden from us mentioned herein does have the most excellent security model implemented that makes the efforts of our law enforcement communities almost worthless and yet we, the people under attack, don’t have the same security model to protect ourselves because as Mr. Goodman presents, the firewalls and antivirus software, etc. businesses provide barely stop 5% of what is out there attacking us.
Just some more to think about, remember at every click and every page visited you are exposed and if you have not been compromised count your blessing for it is just a matter of time. Think about the current socially driven media type products, those are the mainstay of cyber-criminal activities and where you are most likely to get hit. Even if not directly, the amount of data we provide every single second of every single day is accumulated to make a personality and data-bank at levels never before known to mankind and even to that written in fiction. Now that is something to consider and why reducing exposure is an important strategy.
Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015.
No comments:
Post a Comment