Sense of Security This is largely based on preception and trust. How do I trust if the infrastructure or system is secure? We Distance Keeping social distance is recommended to avoid virus infection of COVID-19 attack. Similarly, cyber distance takes the same concept to Risk Taking We can't have 100% secure solution in the course of business. We need to evalate risk and reduce to acceptable Policy #5 If you are asked to formulate corporate cybersecurity policies, here are some advices: Identify key stake holders that will be When Security System Fails Security function of the business or physical process is protected by security system. Specific security system for the latter is Broken Process Secure process by design should be secure if operated according to prescribed scenarios. Passenger screening for human and hand-carried items Deception Everything on earth has good or evil perspectives, same for deception in cyber world. We heard a lot about phishing Remove, Lock, Take We have lots of digital assets on the road, cell phone, notebook, removable storage media etc. There are stringent controls If Not Us, Who? This blog is part 2 of 2. Most of the time, people expect cybersecurity practitioners are experts to deal with If Not Now, When? It has been used in S4x13 theme. This blog is part 1 of 2. Most often, security technology sales send Treat or Trick Halloween is coming and the tradition is once annually. It is a children's custom of calling at houses at Halloween Assumption #2 (2nd topic) No matter individual or enterprise, there are information stored in the cloud. The pre-requisite to use cloud is the communication « Previous 1 … 10 11 12 13 14 … 22 Next »