We are living in the digital age where any person’s data is an asset. In cyber security, we use the phrase “Information Asset” to mean valuable data. Valuable data can be anything from your website login credentials, your name, location, interests and so on. This information, to anyone intending to compromise you, is very important. Nonetheless, this being only an introduction, I will not dive deep into terms and phrases relevant in cyber security. I will only briefly talk about what we mean by cyber space and why securing it, or better still, understanding your weak/vulnerable areas is important.
What is my Cyber Space?
Any device you use to connect to the internet, or connect to a network of other devices makes up your cyber space. For instance, when you log in to your favorite social network via your phone, or use your computer to check mail, that forms your cyber space. Also, when you pick up that phone to send an SMS to your friend, well, that too is your cyber space. So, why is it important to secure it?
Why Secure your Cyber Space?
This has to go unsaid that when your information lands in the wrong hands, a lot of damage can be done. We have had so many cases of leaked data (Kenyans have a special attachment to screenshots ;)) on conversations, user information from companies and so on. A simple sampling question is, how many people have you come across that do not have a password, a pattern or some kind of security to unlock their phone? There you have it. Very few, right? We value our privacy and it is that privacy that we intend to protect at all cost. But, did you know that that password, pattern or face recognition authentication mechanism cannot stop someone from accessing your data?
In my next post, I will talk about how vulnerable you are to an external exploit. I will discuss how ignorance to some simple recommendations can lead to unrepairable damage. Sometimes we think, since that has happened in the United States or UK, it will not affect me here in Kenya. Well, you may be surprised.
I hope this introductory post will trigger your curious hairs and make you more skeptical about your cyber space. This skepticism is required. “Zero Trust” should be your mantra! What you call your cyber space, may not be yours alone…