Have you been worried about your own personal safety as well as security as the tech world continues to grow and threats increase per day?
As the times have shifted in the last decade or so we have started to depend more and more upon our computers as well as other electronic devices for our needs. From our Bank Account information to our zip code, social security numbers, and so much more have all been encrypted into the depths of our tech devices. It’s only natural for you to worry about your own safety when you know the extent of your vulnerability and dependency upon the technology around you.
Is Cyber Security Possible?
The United States’ reliance on networked systems and the high costs associated
with cyber attacks have led many leaders in the US government and the
Department of Defense (DOD) to prioritize protecting our critical networked
infrastructure. Part of that focus is trying to develop a strategy for deterring
adversaries from attacking our networks in the first place. This effort has led
to much debate around the question of whether cyber deterrence is possible.
Answering this question is difficult since the number of adversary groups
capable of attacking US networks is large and our ability to deter each group
will vary based on its motives and levels of risk tolerance. The United States
should not expect a cyber deterrence strategy to achieve the kind of results
seen with our nuclear deterrence strategy during the Cold War. However, a
limited US cyber deterrence strategy is possible. To be effective, this strategy
must be multilayered and use all instruments of US national power.
Cybersecurity for Small Business
You may have heard about the NIST Cybersecurity Framework, but what exactly is it?
And does it apply to you?
NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The Framework is voluntary. It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection.
You can put the NIST Cybersecurity Framework to work in your business in these five areas: Identify, Protect, Detect, Respond, and Recover.
Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.
Cybersecurity Career Path
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations. The cyber career pathway can include none, one, all, or any combination of similar endorsements. However, none are actually required to become a cybersecurity expert. Employers may have requirements for a candidate, which they trust are enough to demonstrate the necessary qualifications. However, one’s proficiency and expertise in cybersecurity is often determined by their inquisitive nature, problem solving skills, technical aptitude, and their ability to understand the interdependencies of people, systems, and applications.