iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Tuesday, March 15, 2016

Reduction to Exposure

Blog Article/Post Caveat (Read First Please: Click the Link)

This is the best anyone can hope for in iSD. Taking actions that will result in your understanding of the threats involved and those actions you take, personally, to mitigate the exposure you will experience. You will experience exposure no matter what you do. The only real way to avoid and succumb is to go back in time before the true Internet began and never, ever, engage in any type of electronic access to the Internet. We all know that it ain’t gonna happen but you can reduce your exposure by the actions you take. 

Example, I am in the IT business and I work with coders all the time as a release management staff member who releases instances of Enterprise applications to QA testing environments then on to the actual production environments. I have a pretty good understanding of how things work and saying that means nothing because I didn’t truly, fully and completely understand what it is we face daily until I read Marc Goodman’s book, Future Crimes. At one time I thought I was secure and safe but in recent months I have found that as long as I continue to use certain products or sites my security and safety is in a critical exposure state. Just yesterday, on an Apple iMac with the latest OS X and updates found my system completely frozen. It seems even the Apple products are succumbing to the cyber-world of predatory actions.

It took me two hard boots to get my system running again and if I were still on a Windows system I suspect, like the last time I got hacked on a Windows XP box, I would be reinstalling a clean OS to remove the offending malware, etc. I got lucky this time and I use a lot of the recommendations as to exposure and actions I recommend. 

As I continue to study and learn about this hidden Internet it comes to mind that there really is a matrix out there and although it is hidden from us, most of us, it still has dangerous effects on us and how Internet experiences. Add in the cloud based models everyone seems to be gravitating towards to save money, those make our exposure even more dangerous especially when individuals and organizations click “Accept” on those ToS’s. 

In self-defense, the one I normally write about involving social and asocial violence that involves human physical contact, I talk/write about awareness and there are many types of such awarenesses so too is there types of awarenesses in iSD or Internet Safety, Security and Protection. There is only one way to achieve that knowledge and understanding and that is to seek it out, study it, understand it and then take what appropriate actions you personally deem necessary to protect yourself. 

As I have stated in other articles your physical self may not be exposed to the dangers of a predatory process and/or resource attack but you psychological side is exposed to predatory process/resource attacks in the iVerse. 

Oh, in a recent article I posted that the dark-verse hidden from us mentioned herein does have the most excellent security model implemented that makes the efforts of our law enforcement communities almost worthless and yet we, the people under attack, don’t have the same security model to protect ourselves because as Mr. Goodman presents, the firewalls and antivirus software, etc. businesses provide barely stop 5% of what is out there attacking us. 

Just some more to think about, remember at every click and every page visited you are exposed and if you have not been compromised count your blessing for it is just a matter of time. Think about the current socially driven media type products, those are the mainstay of cyber-criminal activities and where you are most likely to get hit. Even if not directly, the amount of data we provide every single second of every single day is accumulated to make a personality and data-bank at levels never before known to mankind and even to that written in fiction. Now that is something to consider and why reducing exposure is an important strategy.

Bibliography (Click the link)

Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015. 


No comments:

Post a Comment