A couple of weeks ago, I finally decided that I would become an Author on the Compumatrix Blog. I am relieved to start. I have not been procrastinating. I have honestly had my days, and nights, filled with productive Compumatrix activity. I supported the blog by helping other members become active here, so I am giving myself a pass on feeling guilty for my late start. I have wondered what to write about and decided that I would choose a subject with practical value. I picked something that I am passionate about, which is online security practices.
I coined a phrase five years
ago that I still use today.
“Good Security is inconvenient, but Great security is very inconvenient, yet not nearly as inconvenient as getting hacked.”
Kevin Bowser – 2015
I stand by that phrase, 100%. I often use it as an ice breaker to get people thinking before attempting to guide them through the very inconvenient, effective Security Protocols that I practice. After approximately five years of using my coined phrase, I have yet to find a single person who disagrees. That is practical validation for me that I use to promote the ideas embedded in my coined phrase.
It is a fact that nobody wants to be victimized by hackers. It’s also a fact that most people I talk to about their online security practices are quick to admit that they have bad security habits. Because hackers know that hundreds of millions of people are this way, their motivation has shifted from disrupting peoples’ lives for fun to attacking people for big profits. That motivational shift follows the availability of those computer users and mobile device users who have become low hanging fruit for the growing number of capable hackers.
I must emphasize the importance of adequate security here! It takes a sharply focused effort even to attempt to achieve that level of online protection. Many people are oblivious to how dangerous their security practices are. That is why their risk of being hacked is high. I think readers will agree that we ALL need to do a better job with our Security Practices, especially when considering the following information.
It is a shame when we realize that, no matter what we do, as individuals, that we can never achieve a zero-risk security profile. That is because a large amount of our personal information is on centralized servers owned by others. So, even if you don’t own a computer or a mobile device, your information is still at risk of being obtained by hackers. If you just think about it, you can probably remember news reports about frequent major security breaches in recent years. Without naming names, the list of hacker victims includes numerous major institutions, large companies, celebrities, the military, local governments, and national governments. I recently received a news notification on my phone that had a disturbing article about the sharp increase in ransomware attacks on people working from home. (I placed a link to that article at the bottom of this page.) That information hits home for a growing number of Compumatrix members! IMHO it is a necessary wake-up call for all of us! With that all in mind, it only makes sense that individuals need to make a concentrated effort to secure what they can control.
Over the past five years, I have worked hard teaching many people, what I consider to be effective Online Security Practices. Some have adopted and applied my teachings, while others have not, regardless of my efforts. (That brings to mind something about horses and water, that I won’t bother to repeat here today. Lol.) I’m not pointing a finger, but I am making a point. Hackers are smart. Each year there are more hackers than the previous year. They continue to improve their methods. We must continue to upgrade our efforts to thwart them. We have all worked too hard to get what we have in life and in Compumatrix. We should all know HOW to reduce our risk of being personally hacked. Who needs that shitake mushroom in their life?
This blog article is Part 1 in a series of online security posts that I will publish. I will be sharing security tips to help readers develop a keen awareness and focus on security. Then we can all potentially stay one step ahead of hackers, who thrive on low hanging fruit. Please note that if any of your passwords are password or 123456, you are practically inviting hackers into your life! One can only hope that they won’t R.S.V.P. Chances are they probably will. It’s likely only a matter of time. Tick-tock, Tik Tok, time is up!
Ransomware Attacks Article By Danny Palmer:
(Copy & Paste the URL below into your browser to see the article.)