Different perspectives It is the same scene but different people will interpret it differently. Business managers or plant floor engineers have their We are all just prisoners here, of our own device ... Disruptive technologies and their rapid advancement have changed the way we live. With proliferation of Internet hotspot (mostly free) & Excessive and Unnecessary Control Adding control won't give you more security. I came across advices from other cybersecurity practitioner that overkills. Indeed, the insecure ROAM Remote Office Access Method (inspired by ISAM, VSAM in old days) has undergone significant changes over the past decades due WiFi Getting connected to the Internet for various activities (getting updates from email, news, social media, weather, checking maps, traffic condition Risk Evaluation Risk assessment is the approach to identify hazard and implement proper controls to reduce likelihood. When doing so, we should Do The Right Thing No matter in physical or cyber world, there are facilities built for people using them to achieve certain purposes - Proper Usage #2 Every system has its own weakness and limitation. We can't build a total secure system practically unless it is on Vulnerability Management #2 Vulnerability Management or Scare Your Management Some cybersecurity practitioners conduct vulnerability management (VM) by just using automated vulnerability scanning tool Information Integrity #2 Disseminating of informative message appears does not have much of cybersecurity concerns. However, it depends on the usage purpose. If Insider #2 Industrial Control Systems (ICS) in a plant are now modernized using commodity hardware and software with networking capability to enhance Onion Approach Information protection is usually via layered defence, sometimes refers as the "onion approach". In physical world, protected contents are placed « Previous 1 … 7 8 9 10 11 … 24 Next »