How Individuals Can Adopt a Strong Cybersecurity Posture

How Individuals Can Adopt a Strong Cybersecurity Posture

From Max Shier, CISO of Optiv:

“This year’s Cybersecurity Awareness Month theme is, “See Yourself in Cyber,” which could not be more relevant given the threat landscape we’re battling today. Most data breaches still are caused by individuals falling for threat actors’ tactics of phishing and social engineering, and individuals failing to follow basic cybersecurity best practices. Collectively, as an industry, we need to use the month of October to kick off an ongoing campaign that demonstrates the role each individual plays in both their own and their company’s security, as well as equips them with best practices to adopt a strong security posture. Here are a few practices that will ensure good cyber hygiene:

  • Update passwords regularly and use a strong, unique password for every account. To keep passwords difficult to guess, use combinations of at least 12 letters (upper and lowercase), numbers and characters.
  • Consider using multi-factor authentication (MFA), when possible. MFA is a method of authenticating into an account that requires users to present at least two pieces of evidence to prove their identity — something they know (e.g., a password), as well as something they have (e.g., an authentication code via text or email) or something they are (e.g., facial recognition or a fingerprint scan). Coupling a strong password with MFA will make it exponentially more difficult for cybercriminals to compromise accounts.
  • Slow down when reading emails and text messages and when listening to voice mails. The social engineers that craft phishing, smishing and vishing attacks are banking on the fact that people are busy and likely going to overlook red flags.
  • Report potential phishing/vishing/smishing attacks to corporate IT departments, or, in the case of a personal attack, other appropriate parties (e.g., email provider or FTC).
  • Update devices and software when prompted. Updates not only enhance features, but they provide security patches to address known vulnerabilities.
  • Turn off auto-connect for WiFi and Bluetooth to avoid accidentally connecting to a threat actor’s network.
  • Download software only from legitimate sources.
  • Thoroughly review the permissions mobile applications require before installing them.
  • Limit digital and social footprints. For example, refrain from “checking into” locations and tagging or sharing photos. Keep profile information to a minimum. And lastly, use a VPN and browse in incognito mode.
  • Keep informed of new cybersecurity risks, especially around smart technologies like wearable devices and WiFi-connected appliances.
  • Don’t forget about the Internet of Forgotten Things, those devices you’ve forgotten about but are still connected to your network.
  • Lastly, don’t forget about your home network and router; change the administrative password from its default and set the password to a strong password mentioned above, set up a Guest network for visitors, and only use WPA2 or the newer WPA3 protocols, if your devices support it.”

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.