Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Using Good Cyber Practices to Frame your Personal Cyber Narrative
  • Data Breach

Using Good Cyber Practices to Frame your Personal Cyber Narrative

6 years ago Tripwire Guest Authors
Using Good Cyber Practices to Frame your Personal Cyber Narrative

Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot do in our homes as working from home (WFH) standards, she said how gracious it was for us to let the firms into our home environments where we had already made investments in how and where we wanted to work in our personal space.

So much of what we do daily in our personal ecosphere requires authentication. The WFH bit is just another component of our personal cyber narrative as to what we consume, participate in and add our contributions towards.

We managed our personal data storage, verify both ourselves and others in our ecosystem and give access and control our mobile usage. We already approve or deny information requests in our mailbox, in our apps and in our lives in real time.

But many in the remote workforce lack discipline in following best cybersecurity practices in their home environment. This includes enforcing strong passwords, recognizing phishing emails, and not changing their WiFi protocols to WPA.

I would like to see firms understand that to be good cyber citizens, we need to accountable and protected users. Hiring someone with that profile aids in enabling a secure corporate environment.

Hiring for good cyber practices

So, how can you show an employer your cyber street smarts as an accountable and protected user? 

For me, this can be shown three ways:

  1. By investing in cybersecurity training and badging yourself accordingly on your credentials. Many folks who are WFH have some time to make personal training investments. And as discussed in this recent Cisco blog, gamification is a proven tool for instant feedback to reinforce learners’ hard work. In addition, gamification can promote behavioral changes through a badge system. So to run your home office as you would your physical one, re-skill to have credentials that a hiring employer recognizes.
  2. By investing in personal identity management and verification tools. Whether these are commercial variations (e.g. ThisIsMe) or nationally accepted tools (e.g. in Belgium, ItsMe), solutions like these allow verification of people when interacting online, thus giving them the control over their identity data.
  3. By managing your home network more professionally. Much like you need to keep your laptop or desktop’s operating system updated, you’ll want to double-check your gear, encryption, firewall, and DNS settings. The good news is you can do this yourself. The bad news is that it takes time to do correctly.

And keep your own profile and details clean and accurate. Verification of personal profiles on social media, bank accounts and governmental filing (IRS, FICA) as well as participation in marketplaces as a buyer or seller – all of these in a world where data rights are yet to be upheld. Your aim should be to bring more control to protecting your identity data.

A user that focuses on their own data narrative, one where they are both accountable and protected, is not only a more informed user but less of a risk for WFH ecosystems, as their personal sensitivity to risk is already better addressed.


Author Profile: Dr. Alea Fairchild, Principal Advisor, Technology Enablement , Ecosystm. Dr. Alea Fairchild (@afairch) is a technology commentator and infrastructure specialist. Alea covers the convergence of technology in the cloud, mobile and social spaces. She has a passion for the design and optimisation of physical spaces, exploring how technology can enhance user experiences. Alea helps global enterprises profit from digital process redesign. Outside of her work with Ecosystm, Alea is a Research Fellow at The Constantia Institute, which is a Brussels-based technology policy think-tank focusing on innovation and technological advances and their impact on industry and society. She also teaches graduate courses in technology marketing at KU Leuven in Belgium. Alea received her Doctorate in Applied Economics from Univ. Hasselt in Belgium based on her research in the area of banking and technology. She also holds a Bachelor’s degree in Business Management and Marketing from Cornell University.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Using Good Cyber Practices to Frame your Personal Cyber Narrative” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Finance, Phishing, TripWire

Continue Reading

Previous Microsoft Revamps Windows Insider Preview Bug Bounty Program
Next QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

15 hours ago [email protected] (The Hacker News)
  • Data Breach
  • Vulnerabilities

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

16 hours ago [email protected] (The Hacker News)

Recent Posts

  • TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise
  • Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
  • Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
  • Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
  • 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT