Cyber Security is Everyone

Cyber Security is Everyone's Job

If you haven’t heard already, October is National Cyber Security Awareness Month and things have already gotten off to a good start on social media, especially Twitter (#NCSAM). It’s important to realize that many of us are very much “aware” of cyber security issues on a global basis, so I think it’s time to focus on the fact that cyber security is everyone’s job. Cyber Security is Everyone's Job

We all have a way of taking care of ourselves – hygiene – some are better at it than others, but we all have a standard for defining proper hygiene for ourselves. At a basic level, we know to cover our mouth when we cough or sneeze out of respect for those around us to minimize the spread of germs. So, why then, do we allow cyber “germs” to spread? If we have an infected device, then it is possible that it will infect other devices; thus, the spread of infectious germs begins in the cyber community.

Just as the germs that make up a cold prey on vulnerable individuals, cyber criminals seek out vulnerable devices to infect. This infection, in the form of bots or zombie networks, for example, can quickly reach millions of users. (Ever seen the movie Contagion? This is a great example of how disease spreads and can easily be translated into the cyber world.)

And, don’t forget about social networking and email. If your accounts are not secure, you open up the door for malicious individuals to pretend they are you in online situations. Before you know it, your name could be associated with a social engineering attack that stole millions of dollars from a bank, when in actuality, you are innocent.

As individuals, we all share in the responsibility of cyber security, from a child that is just getting their parent’s permission to use the Internet all the way up to the elderly, who for some, are just learning about the Internet, cyber security, etc. Education is the key differentiator to getting people on board to not only learn about all the cyber security issues, but how each person can do their part to help.

Throughout this month, the theme is “Stop. Think. Connect.” as a way to take precautions, understand the consequences of your actions and behaviors, and enjoy the many benefits the Internet has to offer.

Stop: Understand the risks and learn how to spot potential problems before using the Internet.

Think: Be certain your online path is clear by watching for warning signs. Also, consider how your online actions could impact your safety and those most important to you.

Connect: Be confident online. If you have taken all the precautions to safeguard yourself and others, sit back and enjoy your time spent exploring the Internet.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3