Comparing real-life commonsense security measures to basic cyber security solutions
Cops and Robbers; Dodge Ball; Hide and Seek: these well-known children’s games have all been played for decades. With the ever-increasing blurring between the physical and real worlds, perhaps it’s only a matter of time before we should start teaching tomorrow’s small ones to play ‘Cyber Security Team versus Hackers’, ‘Dodge the Virus’ and ‘Malware Hide and Seek’.
And what would be the point of that? asks the reader with a single raised eyebrow.
Well, awareness, basically. Because in today’s digital age, cyber security is a term we hear almost daily – and whenever something can be turned into a game, it can raise awareness and enhance learning.
While games of ‘Cyber Security Team versus Hackers’ as a variation on Cops and Robbers might not be entirely realistic (yet…?), we aim to be diligent and careful about our security in the physical world.
Let’s see how we can apply the same principles into our cyber lives.
Digital Twins
Cyber security involves protecting electronic systems, networks, servers, computers, mobile devices and data from malicious attacks. You could think of this set of defences to protect the online world as being similar to the walls, doors, alarm systems, and locks and bolts that protect your home.
Let’s compare some real-life commonsense security measures to basic cyber security solutions that everyone should be aware of:
- In real life, we protect our property with a strong wall: You could think of the cyber equivalent as securing your home Wi-Fi network – it’s critical that it’s not open to public access.
- Doors and windows in real life can be shut tight against intruders: In the cyber world, we need to instal reliable anti-virus software to protect our devices from malware.
- Strong locks reinforce the security of closed doors and windows: For the cyber equivalent, it’s important to use strong and complex passwords, which should be changed regularly. You can also consider using a password manager to keep track.
- You might add a bolt and chain for extra security on the door: Say hello to two-factor authentication (2FA) and use it wherever possible for an extra layer of cyber security.
- And what about a security alarm? The cyber equivalent is a firewall, which is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Ongoing property maintenance: In the online world, it’s critical to keep your software updated, and this is where software developers regularly release updates that fix security vulnerabilities. You should do the same for your smartphone as well as your laptop.
- Finally, we’re taught in real life to be wary of strangers: And the same principle holds in the cyber world for suspicious emails – avoid clicking on links or downloading attachments from unknown sources.
With people often being the weakest link in a security chain, we need to educate ourselves about cyber threats, because there’s no doubt that people in general really do need to be more aware and alert in their own right.
We store our personal and sensitive data online. Effective cybersecurity measures are crucial to protect this data and ensure privacy, prevent identity theft, and safeguard against financial losses because, from banking information to personal emails, everything in this connected world could be a target for cybercriminals.
Best practice advice is to speak to the experts. They can help you to ensure that implementing and maintaining your cybersecurity measures is as easy as child’s play.