While it's important to be aware of cybersecurity all year, October marks the Department of Homeland Security’s National Cybersecurity Awareness Month (NCAM). This is a time where individuals and businesses spread awareness of the importance of cybersecurity, ensuring that all digital citizens have the resources they need to be safer and more secure online.
This year’s theme is “Do Your Part. #BeCyberSmart.” It is a reminder that we all have a role to play in protecting our part of cyberspace, stressing personal accountability and the importance of taking proactive steps to enhance cybersecurity. Each week focuses on a unique topic, each of which corresponding to a different part of the enormous task of securing the digital world.
This week’s topic is “Securing Devices at Home and Work,” an extremely important discussion in the age of widespread home office work. Organizations and individuals came together to provide security tips and guidance to share in this time of global uncertainty.
In this blog, we’ll share some of the best contributions to the discussion this week and provide some knowledge of our own to celebrate Cybersecurity Awareness Month.
Why it's worth a read: "If you're relatively new to cybersecurity you may find the jargon confusing. Or maybe you'd like to read more about cybersecurity but don't want to buy a whole book about it. I understand, and I say that as someone who has written whole books about it."
Author: Stephen Cobb is an author and cybersecurity expert who has been posting a blog every day during cybersecurity month. This week, one blog that caught my attention was one regarding resources for learning more about cybersecurity. Once the month comes to a close and the trend of sharing information and guidance dies down, it can be daunting to find a reliable source of quality security news and resources. Cobb rightly points out that the threat of COVID has greatly increased the threat of cyberattack in recent months and that many will be discovering these topics for the first time. It is imperative that all of us continue to learn and practice good cybersecurity even beyond October, and this list of resources is a great way to get started.
Why it's worth a read: "This TedTalk clearly explains the #CyberSecurity challenges that every one of us has every day (both at work and at home) Please don't think that it's an IT problem!"
Author: Rob May, author of The Human Firewall and Ambassador to Cybersecurity at the Institute of Directors gave a Tedx presentation regarding some of the topics from his book. This presentation is particularly relevant this October as it revolves around some of the simple steps we as internet users can take to protect ourselves and those around us. May also analyzes trends in the security space including the rising costs associated with cybercrime. Especially in a day and age every employee must be their own security expert, this is a very insightful presentation to watch.
Why it's worth a read: "Given enough time and enough resources and enough intelligence, someone is going to get through. it's not about if you will be hacked but when you will be hacked."
Author: Cybersecurity Instructor John Hoye. In a conversation with the Battle Creek Enquirer, local cybersecurity expert John Hoye sent a soberingly realistic message to the digital public: Hacking will never end so change your password. This editorial, while somewhat cynical, is ultimately true. Cybersecurity is a continuously ongoing battle between hackers and security professionals. The technology of digital intrusion will continue to become more and more advanced, and all defenders can do is hope to be able combat it when it arises. Security is fundamentally a reactive discipline, and threats will never be fully quashed. That’s why each of us must continually strive to be active in our awareness and response.
Why it's worth a read: "As the premier cyber investigative agency, the FBI works to keep you safe online, but you should follow the cyber safety tips below to help protect yourself and your family. If you do become a victim, contact us to report online crime."
Author: The Federal Bureau of Investigation. In addition to the quality content being shared by individuals with security backgrounds, many large organizations have shared useful information regarding the way they respond to cyber threats. Notable among these is the FBI’s security blog, which year round is a source of valuable news, tips, and ongoing attacks. For NCAM, the FBI shared a list of tips as well as guidelines for digital investigations. They also provided guidance on how to respond to becoming a victim of a cyberattack. If you or someone you know has fallen prey to some illicit behavior online or at work, this could be a highly useful resource.
Why it's worth a read: "Staying diligent and taking necessary precautions is the best way to prevent data loss due to cybercrime. If you have additional questions, the Cybersecurity & Infrastructure Security Agency hosts robust resources on its website that you can reference should you have questions about your own practices and how to strengthen them."
Author: Chris Bradley, Chief Information Officer and SVP of Managed/Cloud Solutions, ProTech Services Group,To round out this week’s practical and poignant conversations about cybersecurity, check out Chris Bradley’s 5 Tips to Prioritize Cybersecurity at Home and in the Office. Bradley has a wealth of experience in protecting the sensitive information of entire organizations. These tips are an understandable list of basic steps we can all employ to protect our both office and home environments.
At Verkada, we believe conversations about cybersecurity need to be constant and ongoing. This organization was founded on strong security DNA that has informed every part of the business as it has grown. From industry-leading security features to a helpful and responsive team of support and security experts, Verkada strives to provide its customers and partners with the best possible resources it can in order to protect their personal data.
To learn more about Verkada’s obsession with cybersecurity, check out this exploration of some of our security features and policies. Topics covered include data encryption, identity protection, and the methods by which we secure our cloud data.