My Cyber Space?

Spread the love
  • 4
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    4
    Shares

We are living in the digital age where any person’s data is an asset. In cyber security, we use the phrase “Information Asset” to mean valuable data. Valuable data can be anything from your website login credentials, your name, location, interests and so on. This information, to anyone intending to compromise you, is very important. Nonetheless, this being only an introduction, I will not dive deep into terms and phrases relevant in cyber security. I will only briefly talk about what we mean by cyber space and why securing it, or better still, understanding your weak/vulnerable areas is important.

What is my Cyber Space?

Any device you use to connect to the internet, or connect to a network of other devices makes up your cyber space. For instance, when you log in to your favorite social network via your phone, or use your computer to check mail, that forms your cyber space. Also, when you pick up that phone to send an SMS to your friend, well, that too is your cyber space. So, why is it important to secure it?

Advertisements

Why Secure your Cyber Space?

 This has to go unsaid that when your information lands in the wrong hands, a lot of damage can be done. We have had so many cases of leaked data (Kenyans have a special attachment to screenshots ;)) on conversations, user information from companies and so on. A simple sampling question is, how many people have you come across that do not have a password, a pattern or some kind of security to unlock their phone? There you have it. Very few, right? We value our privacy and it is that privacy that we intend to protect at all cost. But, did you know that that password, pattern or face recognition authentication mechanism cannot stop someone from accessing your data?

In my next post, I will talk about how vulnerable you are to an external exploit. I will discuss how ignorance to some simple recommendations can lead to unrepairable damage. Sometimes we think, since that has happened in the United States or UK, it will not affect me here in Kenya. Well, you may be surprised.

I hope this introductory post will trigger your curious hairs and make you more skeptical about your cyber space. This skepticism is required. “Zero Trust” should be your mantra! What you call your cyber space, may not be yours alone…

Logging out!


Spread the love
  • 4
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    4
    Shares

Jones Baraza is the founder of Swift Intellect, a software and Cyber Security firm based in Nairobi, Kenya. He is also the founder and project manager for IsVipi OSSN, an open source social networking software with over 1 million downloads. He is passionate about tech and security. You can follow him on Twitter @JonesBaraza