Remove, Lock, Take

We have lots of digital assets on the road, cell phone, notebook, removable storage media etc. There are stringent controls to secure the information inside these containers such as encryption, multi-factor authentication, location awareness, MDM, forced full tunnel VPN. Careless end users might just defeat all these controls if they are unaware they are the biggest threat in protecting information. These simple steps could help to secure: Remove your login session, i.e. logout without waiting the inactivity time out Lock your screen even if you are just turn around your head Take with you the digital asset and don't leave it unattended ...
Read More

If Not Us, Who?

This blog is part 2 of 2. Most of the time, people expect cybersecurity practitioners are experts to deal with cybersecurity matters.  Yes, they are and take the lead but this is only a small part of the game. For a holistic cybersecurity posture, every one plays an important role in the entire jigsaw.  This is because we are all living in the world flooding with information.  This is highly integrated into our daily life.  Every one has the responsibility to secure information in the cyber space not just as an individual but also helps the counterparts that interacted with. So if not us, it's every one....
Read More